This course looks at web users from a few different perspectives. First, we look at identifying techniques to determine web user identities from a server perspective. Second, we will look at obfuscating techniques from a user whom seeks to be anonymous. Finally, we look at forensic techniques, which, when given a hard drive or similar media, we identify users who accessed that server.
Learning Objectives
- Understand the characteristics of internet connections that can't be changed.
- Learn what IP Geolocation is and how to use it.
- Understand what your browser exposes.
- Understanding Anonymous Proxies.
- Understanding various countermeasures.
- Understand basic web log analysis.
- Understand basic database forensic techniques.
- Finally understand that these techniques are a moving target.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Defense Analysis