- This event has passed.
Deep and Dark Web Concepts Training
June 19 @ 8:00 am - 4:30 pm EDT$299 - GWDC Member | $399 Non-GWDC Member
Deep Dark Web 2020 is a one day training seminar with hands-on demonstrations. The intent of this training is to provide vigilance and hands on experience through demos with the deep and dark web concepts. Cyber threat landscape is greater than surface web (google, yahoo, bing, etc.). Over 96% of the web is hidden. Breached data often end up on these hidden corners, sold, traded, or offered for free. As such, it is important for IT auditors, cyber operations professionals, OSINT analysts, and security managers to be aware of real threats. As we all know, “paper security” have not solved cyber issues therefore this is a great opportunity for the industry to learn about the real risks so they can best mitigate.
Participants are required to take notes, engage in discussions, research publicly available information, and lead discussions when directed by instructors.
The seminar is geared towards the layman that have heard of the concepts and need to build on based on real life scenarios.
Participants are required to have:
- internet connection with at least 50mbps speeds
- microphone, speaker, a laptop that turns on, have Windows OS, minimum 8GB RAM,
- 150GB hard disk drive, virtualization enabled on bios.
NOTE: personal laptops only with admin access. Client and corporate devices are not encouraged for use in this course.
Instructors will award a certificate of completion for those that successfully complete the course. Participants can self claim up to 7 CPE credits for each day of successful attendance and participation.
When: June 19, 2020 8:00am - 4:30pm
Where: Zoom Virtual Conference
How Much? $299 GWDC Members | $399 Non-GWDC Members
Who should attend?
Cyber operations professionals to learn about the real threat landscape and how to proactively identify entity data.
IT Auditors to gain practical understanding, application, analysis, of managed networks.
Managers to get a broader entity awareness from managed networks perspective.
Learning Objectives: By the end of this course, participants will be able to
Understand why, when, where, how the internet started – 1 hour
Gain knowledge of dark web from multiple gateways perspective – 3 hours
Define various layers of the internet and how each is managed - .5 hours
Discuss the role of human behavior and managing attribution – 2 hours
use virtual private networks for privacy and dark web gateways for anonymity – .5 hour
introduce the role of encrypted messaging apps and how they are exploited – 1 hour
Deep Dark Web 2020 Training - Instructors
Deep & Dark Web Expert; Author, Beware the Predator
As a career Technical Operations Officer, Mr. Warren Holston has worked throughout the Intelligence Community, Department of Defense, and defense industry for more than 30 years. He has served as a U.S. Navy Explosive Ordnance Disposal Diver, a collection officer and senior manager in the Central Intelligence Agency, and a Subject Matter Expert for the Department of Defense U.S. Special Operations Command. Mr. Holston has managed and conducted counterterrorism, covert action, and technical collection operations worldwide and is recognized as having contributed significantly to the national security of the United States of America. He was awarded the CIA’s Intelligence Commendation Medal for “conceiving of, and implementing, a clandestine sensor operation against a high priority denied area intelligence target” and the Distinguished Career Intelligence Medal for “superior performance in the conduct of clandestine operations in the CIA.” Mr. Holston is the author of the personal security book Beware the Predator and lectures extensively on the application of personal tradecraft in a digital world. He is also the author of the poetic artwork of Peace in Darkness, A Study of the Darkness in Humanity.
Senior Open Source Instructor and Project Manager, BlackHorse Solutions, Inc.
Ms. Heather Hodges is a 12-year Air Force combat veteran currently employed as a Senior Open Source Instructor and Project Manager at BlackHorse Solutions, Inc.
In her military tenure, she was assigned to an Air Force special mission unit attached to the Joint Intelligence Brigade at the Joint Special Operations Command. Ms. Hodges trained with special operations forces as an airborne tactical systems operator, logging more than 3,000 hours conducting manhunting operations across the Middle East and North Africa in direct support to U.S. Special Operations Command units. Her expertise at this time included modes one, two, three, and five.
As non-commissioned officer-in-charge of airborne operations for a deployed detachment, she was responsible for approximately 100 airborne operators, overseeing more than 2,600 missions providing precision intelligence, surveillance, and reconnaissance coverage over denied areas. For her service, Ms. Hodges was awarded the Bronze Star Medal for meritorious achievement as a member of a Joint Task Force in support of Operation Enduring Freedom.
Upon honorable completion of her military career, Ms. Hodges joined BlackHorse Solutions in 2017 where she specializes in publicly available information research and training. As a Senior Instructor for BlackHorse Solutions’ customized courses, she continues to support USSOCOM as an expert in open source intelligence. She is the Project Manager for the U.S. Army Special Operations Command program at BlackHorse, responsible for product integrity and ensuring training requirements are met relating to publicly available information and open source intelligence. Ms. Hodges’ additional expertise includes research and training in dark web intelligence, information and influence operations, counterterrorism, identity management, and digital signature reduction.
Kenneth joined ISACA in 2013 and presently serves as the GWDC Communications Director. Kenneth is a Principal Architect for Unisys Federal. He holds the CISM, CISA, PMP, CIPP/G, and AWS CCP.