Basic Internet training

Basic Internet Training | Online Classes Webinar training | Basic Internet Training Coaching and Personal Training - Basic Internet Training

Basic Internet training is the foundation of online investigations. It introduces the tools and concepts valuable to new and experienced investigators. NetBootCamp provides these skills through onsite and online consultation.

You’ll begin the training by setting up your investigative workstation: browsers, add-ons and the anonymous surfing proxies that you’ll use throughout your career. You’ll become a master of search engine queries, using advanced operators that target profiles only, or results on specific websites, from a time period you specify. You’ll learn about IP addresses, how traffic is routed, and how to geolocate servers even when the operators provide misleading location information.

Traceroutes, email header investigations, advanced Google search techniques, HTML, and anonymous surfing are the everyday tasks of an Internet investigator. You’ll learn these skills via hands-on participation in the Basic Internet classes.

Basic Internet training is the 1st stage of the bootcamp series. After mastering Basic Internet, you’ll progress to Website Investigations and then Social Networks in the 2nd and 3rd stages of the core training program.

Sampleclasses: Basic Internet training

InfoInvestigation Tools & Software (B1)Search Techniques (B2)IP Addresses (B3)Traceroutes & Networks (B4)Email Investigations (B5)Anonymous Surfing (B6)HTML for investigators (B7)TOR (B8)BitTorrent (B9)
Bootcamp Stage 1

The Investigator’s computer is set up with the core recommended tools.

  • Recommended desktop and portable applications, browsers, bookmarks, and add-ons are provided via download.
  • Instructor introduces the functions of tools and provides recommendations for essential subscriptions.
Advanced search: Methods to re-think search and extract data from websites and search engines.

  • Google advanced search operators are introduced with practical exercises.
  • Recommended uses for Bing and foreign language search engines are also discussed.
  • Methods to search online drives to locate public files are covered with Google Drive & Picasa, Skydrive, Dropbox, and Box.
  • Search methods to target profiles, forums, and specific platforms like cyberlockers, blogs, FTP, and social networks are covered.
  • Visual web crawling tools are introduced for extracting data from the target directly or through Google.
  • Tools to monitor RSS feeds and create search alerts are provided.

Session includes: Practical exercises, tools, downloadable resources.

Understanding how the Internet works and how it is abused

  • Introduction to IP addresses: IPv4
  • AS Numbers: ISPs that peer with other ISPs
  • IP address details
  • DNS: How Domain names are resolved
  • IP address geolocation
  • Rogue ASNs and ISPs
  • Overview of IPv6
  • Practical exercise: Tools, Exercise handouts, Online resources
Understanding ISPs, how traffic is exchanged, and how tools are misled

  • Troubleshoot ISP and server location
  • Identify ASN, DNS, MX , reverse IP, subdomains
  • Server location obfuscation:  Proxies, CDNs, rWhois contacts
  • Enumerate domains and IP addresses on an ISP
  • Advanced tracerouting

Some website owners operate their own ISP via a reassigned IP addresses. Some also use online, intermediary services like CloudFlare to conceal the server location. Investigators will learn how to investigate web hosting and verify server locations via peering, datacenter maps, traceroute, and more.

More than an IP address:  Finding additional clues about a sender via headers

  • Read email headers: IP address, sender’s computer name
  • Comparison of Gmail, Yahoo, Hotmail, and web hosted email
  • IP address proxies and date time stamps
  • Undercover email considerations

Investigators will learn how to read email headers and how email clients, web hosted mail, and proxies alter the details. Potential header details such as the sender’s computer name, city location, and time zone will also be discussed. Undercover considerations and basic trap-and-trace methods will be introduced for capturing similar information from a recipient.

What website operators know about you: How to get blocked,  how to stay anonymous

  • Operators block visitors, referral links, countries: .htaccess
  • Staying anonymous: Cookies, Proxies, and Search
  • Checking your IP address
  • Checking browser geolocation leaks

Other anonymizers

Introduction to HTML and source code clues

Header

  • Meta description
  • Meta keywords
  • Script author and hosting locations

Body

  • CSS
  • Themes
  • Image hosting
  • Video Hosting
  • iFrames
  • Blogger accounts
  • Authors and Email accounts

Footer

  • Publisher codes
  • Advertising codes
  • Analytics codes
  • Sharing widget codes
  • Theme author


Overview of TOR and the Onion Network

  • TOR Bundle installation
  • TOR search listings
  • Investigation considerations for TOR
Exchanging files and IP addresses:  BitTorrent Network

  • Overview of BitTorrent and P2P file sharing
  • Indexing sites, Trackers, Seeders, Leechers, and more
  • Examining the activity, estimating volumes
  • BitTorrent client installation
  • Investigation considerations for BitTorrent

 

More