The online world is filled with serious digital threats, some of these may pose real-life dangers. As digital investigators, we must know how and when to protect our identities, systems, and network traffic from exposure AND how to tactically blend in with “normal” user traffic. Those decisions are part of having good Operational Security (OPSEC), and knowing how to develop this for yourself through tailored settings, software, and applications is what you’re going to learn in this 2-hour course.
Key learning objectives:
- Master the art of detecting and neutralizing digital risks, crafting a robust personal threat model.
- Reinforce your digital defenses before diving into investigative depths.
- Adapt your online presence, merging seamlessly into the digital landscape whenever the mission demands
At the end of the course, you will:
- Know what a threat model is and how to create one.
- Know what Operational Security is and how to develop yours.
- Know what a VPN is, how it works, and how to choose one.
- Know what the Tor dark web is and how you might use it to increase anonymity.
- Know how to apply identity protections at each critical point of exposure.
- Know where to find additional resources, tools, and systems to continually grow your OPSEC.
- Feel confident in your safety and security during online investigations.
Earn 2 CPE/CEUs for completing this course.
Micah Hoffman and Griffin Glynn authored and teach the course.
This course consists of online videos accessible from mobile app and/or web browser. Lecture, demonstration, and hands-on exercises.
A course completion certificate is automatically provided to students finishing this course.
To successfully complete this course, you must have access to the internet and a modern web browser.