The Dark Web Training Course
This course is designed for individuals who need to gather intelligence or evidence from the Dark Web. This typically includes those employed in government or law enforcement, but it may also be relevant to the private sector.
This course is available as onsite live training in Portugal or online live training.Course Outline
- Grasp the distinction between the Clear Web and the Deep Web.
- Identify the precautions necessary when navigating the Deep Web.
- Learn how to install and configure a Linux distribution.
- Discover methods to fully anonymize yourself and your browsing activities.
- Explore techniques for indexing and searching for websites on the Deep Web.
- Gain insights into Bitcoin and PGP.
- Clarify common misconceptions and myths surrounding the Deep Web.
Requirements
A fundamental understanding of computers and the internet.
Custom Corporate Training
Training solutions designed exclusively for businesses.
- Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
- Flexible Schedule: Dates and times adapted to your team's agenda.
- Format: Online (live), In-company (at your offices), or Hybrid.
Price per private group, online live training, starting from 1300 € + VAT*
Contact us for an exact quote and to hear our latest promotions
(*The final price may vary depending on the technical specialization of the course, the level of customization, the method of delivery and the number of learners)
Need help picking the right course?
info@nobleprog.pt or +351 30 050 9666
The Dark Web Training Course - Enquiry
The Dark Web - Consultancy Enquiry
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
Provisional Upcoming Courses (Contact Us For More Information)
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led live training in Portugal (online or onsite) targets system administrators who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorisation.
Upon completion of this training, participants will be able to:
- Install and configure 389 Directory Server.
- Understand the features and architecture of 389 Directory Server.
- Learn how to configure the directory server using the web console and CLI.
- Set up and monitor replication for high availability and load balancing.
- Manage LDAP authentication using SSSD for faster performance.
- Integrate 389 Directory Server with Microsoft Active Directory.
Active Directory for Admins
21 HoursThis instructor-led, live training in Portugal (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Set up a domain and define access rights of users and devices.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication.
Android Security
14 HoursAndroid serves as an open platform for mobile devices, including smartphones and tablets. While it offers a broad range of security features to facilitate the development of secure software, it also lacks certain security aspects found in other handheld platforms. This course provides a comprehensive overview of these features, highlighting critical shortcomings related to the underlying Linux system, the file system, and the general environment. It also addresses issues associated with permission management and other Android software development components.
Typical security pitfalls and vulnerabilities are examined for both native code and Java applications, alongside recommendations and best practices to prevent and mitigate them. Many of the discussed issues are supported by real-life examples and case studies. Finally, we provide a brief overview on utilizing security testing tools to identify security-related programming bugs.
Participants attending this course will
- Understand fundamental concepts of security, IT security, and secure coding
- Learn about Android security solutions
- Learn to utilize various security features of the Android platform
- Gain insight into recent Java vulnerabilities on Android
- Understand typical coding mistakes and how to avoid them
- Gain understanding of native code vulnerabilities on Android
- Realize the severe consequences of insecure buffer handling in native code
- Understand architectural protection techniques and their weaknesses
- Obtain resources and further reading on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursImplementing a secure networked application can be challenging, even for developers who have previously used various cryptographic building blocks (such as encryption and digital signatures). To help participants grasp the role and usage of these cryptographic primitives, the course first establishes a solid foundation on the main requirements of secure communication – secure acknowledgement, integrity, confidentiality, remote identification, and anonymity – while also presenting typical problems that can compromise these requirements along with real-world solutions.
As cryptography is a critical aspect of network security, the course discusses the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Instead of presenting an in-depth mathematical background, these elements are discussed from a developer's perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.
Typical crypto vulnerabilities are discussed both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.
Finally, as XML technology is central for data exchange by networked applications, the security aspects of XML are described. This includes the usage of XML within web services and SOAP messages alongside protection measures such as XML signature and XML encryption – as well as weaknesses in those protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Understand security concepts of Web services
- Get sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursThis three-day course provides an introduction to safeguarding C/C++ code against malicious actors who might exploit vulnerabilities related to memory management and input handling. The training focuses on the core principles of developing secure code.
Advanced Java Security
21 HoursEven seasoned Java developers do not necessarily master every security service provided by Java, nor are they always fully aware of the various vulnerabilities relevant to Java-based web applications.
Beyond introducing the security components of Standard Java Edition, this course addresses security challenges in Java Enterprise Edition (JEE) and web services. The discussion of specific services is preceded by an exploration of the foundations of cryptography and secure communication. Practical exercises cover both declarative and programmatic security techniques in JEE, while the course examines transport-layer and end-to-end security for web services. Participants will engage in hands-on exercises to explore the discussed APIs and tools firsthand.
The course also examines and explains the most common and severe programming flaws in the Java language and platform, along with web-related vulnerabilities. In addition to typical errors made by Java developers, the introduced security vulnerabilities encompass both language-specific issues and problems arising from the runtime environment. All vulnerabilities and their associated attacks are demonstrated through clear, practical exercises, followed by recommended coding guidelines and potential mitigation strategies.
Participants attending this course will
- Grasp the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and understand how to avoid them
- Comprehend the security concepts underpinning web services
- Gain proficiency in utilizing various security features within the Java development environment
- Develop a practical understanding of cryptography
- Understand the security solutions offered by Java EE
- Identify typical coding mistakes and learn how to prevent them
- Gain insight into recent vulnerabilities within the Java framework
- Acquire practical knowledge of security testing tools
- Receive resources and further reading materials on secure coding practices
Audience
Developers
Standard Java Security: Secure Coding & Development Practices
14 HoursDescription
The Java language and Runtime Environment (JRE) were engineered to mitigate the most prevalent security vulnerabilities found in other languages, such as C/C++. However, software developers and architects must not only master the positive security features of the Java environment but also remain vigilant regarding the numerous vulnerabilities that still impact Java development (negative security).
This course begins with a concise overview of cryptographic foundations, establishing a common baseline for understanding the purpose and operation of applicable components. Participants will explore the practical application of these components through hands-on exercises, allowing them to experiment with the discussed APIs firsthand.
The curriculum thoroughly examines the most frequent and severe programming flaws inherent to the Java language and platform, covering both typical mistakes made by Java developers and issues specific to the language and environment. Each vulnerability and associated attack is demonstrated through accessible exercises, followed by recommended coding guidelines and potential mitigation techniques.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and discover how to avoid them
- Acquire the skills to utilize various security features within the Java development environment
- Gain a practical understanding of cryptography
- Identify typical coding mistakes and learn how to avoid them
- Receive information regarding recent vulnerabilities within the Java framework
- Obtain resources and further reading materials on secure coding practices
Audience
Developers
.NET, C# and ASP.NET Security Development
14 HoursToday, numerous programming languages can compile code for the .NET and ASP.NET frameworks. While this environment offers robust tools for security development, developers must understand how to apply programming techniques at both the architecture and coding levels. This knowledge is essential for implementing desired security features, avoiding vulnerabilities, and limiting potential exploitation.
This course aims to equip developers with the skills to prevent untrusted code from executing privileged actions, protect resources via strong authentication and authorization, manage remote procedure calls and sessions, and implement various functional alternatives. Through extensive hands-on exercises, participants will gain practical insights into these critical areas.
The discussion on vulnerabilities begins by examining common programming errors encountered when using .NET. The analysis of ASP.NET vulnerabilities further explores various environment settings and their impacts. Additionally, the course addresses ASP.NET-specific security challenges, including general web application security issues and specialized attack vectors such as ViewState manipulation and string termination attacks.
Participants attending this course will
- Grasp the fundamental concepts of security, IT security, and secure coding practices
- Identify web vulnerabilities beyond the OWASP Top Ten and learn strategies to avoid them
- Utilize the various security features available in the .NET development environment
- Acquire practical experience with security testing tools
- Recognize typical coding mistakes and understand how to prevent them
- Stay informed about recent vulnerabilities affecting .NET and ASP.NET
- Access resources and further reading materials on secure coding practices
Audience
Developers
The Secure Coding Landscape
14 HoursThis course introduces fundamental security concepts, providing an overview of vulnerabilities that transcend specific programming languages and platforms. It explains how to manage software security risks across all phases of the software development lifecycle. Rather than delving into intricate technical details, the course highlights the most prevalent and impactful vulnerabilities in various development technologies. It also outlines the challenges associated with security testing, offering techniques and tools to help identify existing issues within your code.
Participants attending this course will
- Grasp basic concepts of security, IT security, and secure coding
- Understand web vulnerabilities affecting both server and client sides
- Appreciate the serious consequences of improper buffer handling
- Stay informed about recent vulnerabilities in development environments and frameworks
- Learn about common coding errors and strategies to avoid them
- Comprehend security testing approaches and methodologies
Audience
Managers
FreeIPA for Administrators
14 HoursThis instructor-led live training in Portugal (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize the authentication, authorization and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
- Enable Single Sign On authentication across all systems, services and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate and migrate an FreeIPA server.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Portugal (online or onsite) is tailored for system administrators who wish to leverage Okta for identity and access management.
Upon completing this training, participants will be capable of:
- Configuring, integrating, and managing Okta.
- Integrating Okta into an existing application.
- Enhancing security through multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Portugal (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led, live training in Portugal (online or onsite) is aimed at system administrators who wish to use OpenAM to manage identity and access controls for web applications.
By the end of this training, participants will be able to:
- Set up the necessary server environment to start configuring authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Use federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to extend identity management securely across different systems or applications.
- Access and manage authentication, authorization, and identity services through REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led, live training in Portugal (online or onsite) is aimed at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.