Introduces Data Breaches, then explains and provides live on-line demonstrations of the processes to locate and capture intelligence.
The practitioner will be introduced to the extensive velocity & variety of data breaches and will learn how to extract intelligence from them for the benefit of an investigation.
The practitioner will be introduced to Data Breaches and will know how to locate and extract intelligence from different types of Data Breach.
Module 16 does differentiate but only in the Live Online Training, where investigation opportunities that are available only to Law Enforcement officers are introduced.
INTRODUCING DATA BREACHES
DEFINITION
DIFFERENTIATING A DATA LEAK
VELOCITY & VARIETY
CAUSES & VULNERABILITIES
WEAK & STOLEN CREDENTIALS
BACK DOORS, APPLICATION VULNERABILITIES
MALWARE & RANSOMWARE
SOCIAL ENGINEERING
EXCESSIVE PERMISSIONS
INSIDER THREATS
PHYSICAL ATTACKS
IMPROPER CONFIGURATION, USER ERROR
PROMINENT DATA BREACHES
CAM4
YAHOO 2017
VERIFICATIONS.IO
LINKEDIN 2021
FACEBOOK 2019
YAHOO 2014
STARWOOD (MARRIOTT)
ADULT FRIEND FINDER
TWITTER 2018
LINKEDIN 2012
EQUIFAX
EBAY
DATA EXTORTION
DATA BACKUP
ALTERNATIVE EXTORTION
PROCESSING DATA BREACHES
LEGAL IMPLICATIONS
DATA BREACH RESOURCES
FREE RESOURCES
HAVE I BEEN PWNED
BREACH CHECKER
SCATTEREDSECRETS
FREEMIUM RESOURCES
INTELLIGENCEX
LEAK-LOOKUP
PREMIUM RESOURCES
PASTE BIN RESOURCES
PASTE BINS & BREACH DATA
TEXTBIN 28
PASTEBIN SEARCH 29
PSBDMP 30
PASTE BIN SEARCH ENGINE
DARK WEB RESOURCES
RANSOMWARE GROUP SITES
BL@C0KTR
LOCK DATA AUCTION
SNATCH