Available courses

CSI Linux Certification Exams

The CSI Linux Certified Investigator (CSIL-CI) is a certification focusing on the usage of CSI Linux.  This is an entry-level certification that covers the basics of using CSI Linux to do computer forensics and cyber investigations. Who is CI For?Law EnforcementIntelligence PersonnelPrivate InvestigatorsInsurance InvestigatorsCyber Incident RespondersDigital Forensics (DFIR) analystsPenetration TestersSocial EngineersRecruitersHuman Resources PersonnelResearchersExam FormatOnline85 questions2 hoursA minimum passing score of 85%

28 Lessons
CSIL - Online Investigations

Uncover a Universe of Hidden Information with the CSI Linux Certified-OSINT Analyst (CSIL-COA) Step across the threshold into the pulsing heart of the digital landscape where countless secrets lie concealed within the sprawling expanse of the world's online data. This is not a realm for casual social interactions; it's a high-stakes arena of intrigue, where a single misstep could lead you into a labyrinth of disinformation. This is the thrilling frontier of Open Source Intelligence (OSINT), and you're on the cusp of conquering it. Embrace the challenge and hone your craft as a CSI Linux Certified-OSINT Analyst. Dive into a universe brimming with cutting-edge tools, mastering techniques for collecting and safeguarding digital evidence. Learn to navigate the vast sea of the internet, strategically accumulating priceless insights into your targets. Become a digital sleuth, crafting compelling reports that offer your clients the clarity needed to make decisive actions. Embark on this transformative journey to become an OSINT professional. Do you possess an insatiable curiosity and the ability to decipher hidden meanings? Are you drawn to the challenge of tracing the intricate web of interactions across social media platforms, discussion forums, and content curation networks? As a CSI Linux Certified-OSINT Analyst, you'll sharpen your online presence detection skills, refining your collection methods to perfection. In the digital age, every investigation comes with an online facet. Even the seemingly insignificant clue can unlock an avalanche of leads, giving you the edge you need to crack the most complex cases. With the CSIL-COA certification, you'll harness the power of open-source intelligence and investigation, mastering the art of data collection, analysis, and reporting. This proficiency equips you to deliver actionable intelligence to decision-makers, a critical skill in numerous fields. Join the ranks of elite investigators and cyber sleuths who navigate the digital realm with skill and precision, uncovering the truth that others may overlook. The adventure of a lifetime awaits — seize it today as a CSI Linux Certified-OSINT Analysis professional! Who can harness the power of the CSIL-COA? Law Enforcement Intelligence Personnel Private Investigators Insurance Investigators Cyber Incident Responders Digital Forensics (DFIR) analysts Penetration Testers Social Engineers Recruiters Human Resources Personnel Researchers Investigative Journalists Our examination is composed of multiple domains designed to provide comprehensive knowledge in the field, including OPSEC, Technology Basics, Laws, Ethics and Investigations, Identification, Collection & Preservation, Examination & Analysis, and Presentation & Reporting. The exam format includes: Online testing 85 questions (Multiple Choice) 2 hours A minimum passing score of 85% Cost: $385 Your certification will remain valid for three years from the date you attain it. To maintain your certification status, contact us at exams@csilinux.com with your certification ID to receive a voucher for updated training and the newest version of the certification test. This offer is FREE for five years after your initial certification date, as we are committed to providing you with resources to keep up-to-date with the industry at an affordable cost. Remember to stay within the three-year cycle for recertification to keep your qualification active. Begin your exhilarating journey today. Become a CSI Linux Certified-OSINT Analyst!

31 Lessons
CSIL - Online Investigations

The CSI Linux Certified Social Media Investigator (CSIL-CSMI) is an open-source intelligence and investigation certification that applies to Data Collection, Analysis, and Reporting of open source information to help provide actionable intelligence to decision-makers.Who is CSMI For?Law EnforcementIntelligence PersonnelPrivate InvestigatorsInsurance InvestigatorsCyber Incident RespondersDigital Forensics (DFIR) analystsPenetration TestersSocial EngineersRecruitersHuman Resources PersonnelResearchersDomain WeightsOPSEC (%13)Technology Basics (%20)Laws, Ethics, and Investigations (%9)Identification (%16)Collection & Preservation (%13)Examination & Analysis (%13)Presentation & Reporting (%14)Exam FormatOnline85 questions2 hoursA minimum passing score of 85%

31 Lessons
CSIL - Online Investigations

The CSI Linux Certified Dark Web Investigator (CSI-CDWI) is a Dark Web Investigation certification that applies to the Data Collection, Analysis, and Reporting of Dark Web information to help provide actionable intelligence to investigators and decision-makers.Who is CSIL-CDWI For?Law EnforcementIntelligence PersonnelPrivate InvestigatorsInsurance InvestigatorsCyber Incident RespondersDigital Forensics (DFIR) analystsPenetration TestersSocial EngineersRecruitersHuman Resources PersonnelResearchersDomain WeightsOPSEC (%13)Technology Basics (%20)Laws, Ethics, and Investigations (%9)Identification (%16)Collection & Preservation (%13)Examination & Analysis (%13)Presentation & Reporting (%14)Exam FormatOnline85 questions2 hoursA minimum passing score of 85%

28 Lessons

 https://csilinux.com/wp-content/uploads/2023/08/CCFI-1.mp4 In an era of pervasive digital connectivity and escalating cyber threats, the need for adept computer forensics specialists has never been more critical. The CSI Linux Certified Computer Forensic Investigator (CSIL CCFI) is a hallmark of proficiency, dedicated to those who champion the rigorous methods, tools, and processes vital for identifying, collecting, examining, and presenting digital evidence. This evidence, handled with meticulous care, stands robustly admissible in court. In the subsequent landscape, where challenges in safeguarding digital assets and deciphering cyber incidents abound, the CSIL CCFI is more than just a certification—it's a testament to one's commitment to the forefront of digital investigation. Earning this certification underscores an individual's expertise, dedication, and readiness to navigate intricate digital investigations, setting them a cut above in a world that values specialization. Step into the elite circle of digital detectives and be acknowledged for your prowess in the ever-evolving domain of computer forensics.                                                                                                                                                                          The CSIL-CCFI Exam details Exam Format: Online testing 85 questions (Multiple Choice) 2 hours A minimum passing score of 85% Cost: $385 Domain Weight Computer Forensic Fundamentals (%10) Digital Devices & Storage Media (%13) Forensic Tools & Techniques (%20) OS & File System Forensics (%17) Incident & Event Log Analysis (%13) Network Forensics (%12) Presentation & Reporting (%10) Laws and Ethics (%5)   Certification Validity and Retest: The certification is valid for a period of three years. To receive a free retest voucher within this period, you must either: Submit a paper related to the subject you were certified in, ensuring it aligns with the course material.Provide a walkthrough on a tool not addressed in the original course but can be a valuable supplement to the content. This fosters continuous learning and allows for enriching the community and the field. Doing this underscores your commitment to staying updated in the industry. If you don't adhere to these requirements and fail to recertify within the 3-year timeframe, your certification will expire.

31 Lessons
CSIL - Specialists

Objective: The CSIL-CINST course is designed to produce top-tier instructors who are not only proficient in the technical intricacies of CSI Linux but are also skilled in classroom management, effective presentation, and aligning course expectations to ensure optimum learner outcomes.Course Overview:CSI Linux Mastery: Dive deep into the core functionalities of CSI Linux, including installation, management, troubleshooting, and administration. By the end of this module, candidates will have a thorough understanding of the system's infrastructure and best practices.Classroom Management: Explore strategies to create an engaging learning environment, manage diverse student behaviors, and address challenges that may arise in a live classroom setting. Learn how to facilitate discussions, encourage participation, and ensure a smooth and productive learning experience for all.Presentation Skills: Develop the art of delivering clear, concise, and compelling presentations. This module will offer techniques for content structuring, visual aids, audience engagement, and feedback collection.Managing Course Expectations: Understand the dynamics of setting, managing, and meeting course expectations. Learn how to align the course content with learners' goals, communicate effectively about course outcomes, and ensure that learners and instructors are on the same page.CSI Linux Academy Administration: Navigate the essentials of the CSI Linux Academy platform. From course creation and content management to student tracking and assessment tools, acquire the skills to efficiently manage and deliver courses on the CSI Linux Academy platform.Examination Details:Format: Multiple Choice QuestionsTotal Questions: 85Passing Score: 85%Coverage: The examination will assess candidates on all modules mentioned above, ensuring a holistic evaluation of their technical proficiency and teaching capabilities.Upon successful completion of the course and passing the certification exam, candidates will be awarded the CSIL-INST (CSI Linux Certified Instructor) certification, signifying their expertise and readiness to deliver high-quality instruction on CSI Linux and its associated platforms

9 Lessons
CSI Linux Courses

This course focuses on staying safe on the Internet and how to recognize common cyber risks you may face.  The material was originally focused around teens to young adults but is useful for anyone that doesn't have an extensive cyber background.

8 Lessons
CSI Linux Courses

This course has material that will help you learn how to navigate Linux and Bash scripting.  This will help you manage, troubleshoot, and add automation to your CSI Linux platform.

5 Lessons
Information Security

CompTIA Security+ is the certification globally trusted to validate foundational, vendor-neutral IT security knowledge and skills. As a benchmark for best practices in IT security, this certification covers the essential principles for network security and risk management – making it an important stepping stone of an IT security career. CompTIA Security+ is the first security certification IT professionals should earn. It establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Security+ incorporates best practices in hands-on troubleshooting to ensure security professionals have practical security problem-solving skills. Cybersecurity professionals with Security+ know how to address security incidents – not just identify them. Security+ is compliant with ISO 17024 standards and approved by the US DoD to meet directive 8140/8570.01-M requirements.OBJECTIVESProvide operational, information, application, and infrastructure level securitySecure the network to maintain availability, integrity, and confidentiality of critical informationOperate within a set of rules, policies, and regulations wherever applicableComprehend Risk identification and mitigationAUDIENCEThe series is intended for aspiring IT security professionals entering into security.The professionals who are Digital Forensic Examiners, Systems Administrator, Cybersecurity Managers, Information Security Team, Junior IT Auditor/Penetration Tester.

19 Lessons
Information Security
18 Lessons
Information Security

This is a base CSI Linux Incident Response, CHFI, and CompTIA Cybersecurity Analyst+ (CySA+) combined course.  In this course, you will learn everything you need to know to pass the CySA+ along with gaining key skills that will allow you to test security and identify risks.  It is suggested you use CSI Linux because there are many labs in this course.  The CompTIA Cybersecurity Analyst+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.”This course will teach you the fundamental principles of using threat and vulnerability analysis tools plus digital forensic tools Aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security EngineerObjectivesIdentify tools and techniques to use to perform an environmental reconnaissance of a target network or security system.Collect, analyze, and interpret security data from multiple log and monitoring sources.Use network host and web application vulnerability assessment tools and interpret the results to provide effective mitigation.Understand and remediate identity management, authentication, and access control issues.Participate in a senior role within an incident response team and use forensic tools to identify the source of an attack.Understand the use of frameworks, policies, and procedures and report on security architecture with recommendations for effective compensating controls

15 Lessons

Knowing how to think like the enemy is a massive advantage when trying to defend against or track them down.  This course focuses on the offensive side of security while preparing you for the CSI Linux Penetration Testing and Exploitation, EC-Council Certified Ethical Hacker (CEH), and CompTIA's Pentest+ certifications.  By the end of the training, you will have learned the base process of conducting a penetration test risk assessment to identify and take advantage of weaknesses and vulnerabilities.  You will also have access to a large test back to help you prepare for the three certifications listed above.

23 Lessons

We all belong to many groups; you’re a member of your sociology class, and you’re a member of your family; you may belong to a political party, sports team, or the crowd watching a sporting event; you’re a citizen of your country, and you’re a part of a generation. You may have a somewhat different role in each group and feel differently in each.Groups vary in their sizes and formalities, as well as in the levels of attachment between group members, among other things. Within a large group, smaller groups may exist, and each group may behave differently.At a rock concert, for example, some may enjoy singing along, others prefer to sit and observe, while still others may join in a mosh pit or try crowd surfing. Why do we feel and act differently in different types of social situations? Why might people of a single group exhibit different behaviors in the same situation? Why might people acting similarly not feel connected to others exhibiting the same behavior? These are some of the many questions sociologists ask as they study people and societies.

5 Lessons

This is the introductory course for Python for Beginners.  Please start here if you have no experience coding in Python.  This course is self-paced; you can proceed through the course, but need to complete each unit before moving on to the next unit.

10 Lessons

In this course, you will learn everything you need to know to start developing basic bash scripts and do it from a security mindset.  You will also learn ideas for how to automate tasks, add error handling in shell, and Linux Linux administration.   There is an online bash emulator available in the course, but it is a LOT better if you have your own Linux system like CSI Linux to practice your coding in.You will also get access to several eBooks that are useful for getting very good with bash.

10 Lessons

Python is a language with a simple syntax, and a powerful set of libraries. It is an interpreted language, with a rich programming environment, including a robust debugger and profiler. ... We cover data types, control flow, object-oriented programming, and security focused application development.

16 Lessons

Introductory survey on the basic principles, terminology, and methods of political science. Combines historical study of the discipline's greatest thinkers with analysis of contemporary issues.thomas edison, asba, college credit, ace

68 Lessons
Behavior and Politics

A Detailed introduction to the fundamental principles of psychology and to the major subjects of psychological inquiry.college credit, ace, excelsior, uexcel

88 Lessons
Behavior and Politics

This course is designed to introduce you to a range of basic sociological principles so that you can develop your own sociological imagination. You will learn about the origins of sociology as a discipline and be introduced to major sociological theories and methods of research. You will also explore such topics as sex and gender, deviance, and racism.college credit, ace

37 Lessons

Examination of the major texts and figures in the history of political thought, including Plato, Machiavelli, and Rousseau. Topics of analysis include: power, justice, rights, law, and other issues pertaining to governance. college credit, nccrs, thomas edison, asba

54 Lessons
Communicating More Effectively

{GENERICO:type="QuickInfo-2",time="56"}This course will introduce you to communication principles, common communication practices and a selection of theories to better understand the communication transactions that you experience in your daily life.

49 Lessons
Communicating More Effectively

This course is designed to provide adult learners with the basic skills they need to write effective documents in the workplace. adamjee, pluggedinva, simca

49 Lessons
Communicating More Effectively

This course will help you effectively develop employment application materials for today’s job market by honing your resume writing skills, providing you with tools to create an impressive resume (or to improve the one you already have), and giving suggestions on developing an effective cover letter. pluggedinva

14 Lessons
Communicating More Effectively

{GENERICO:type="QuickInfo-2",time="4"}This course is intended to help you showcase your personality, strengths, interests, and abilities to potential employers through the interview process.

16 Lessons
Communicating More Effectively

{GENERICO:type="QuickInfo-2",time="6"}Learn about typical workplace etiquette protocols, communication standards, and cultural awareness strategies in order to navigate common workplace obstacles as smoothly as possible.

19 Lessons
Communicating More Effectively

This course is designed to help you learn how to plan, produce, and perform acts of communication that satisfy the most demanding audience: your customers.

33 Lessons
Communicating More Effectively

{GENERICO:type="QuickInfo-2",time="12"}A survey of several time management tools and techniques that can be applied to most work and life situations.

18 Lessons
Communicating More Effectively

Examination of the elements and factors which result in an effective speech.

93 Lessons
Communicating More Effectively

This course is designed for practical applications of crisis communication principles, which can be used to protect and defend a company or organization facing a problem or challenge that threatens to harm its brand or reputation.

32 Lessons
Communicating More Effectively

{GENERICO:type="QuickInfo-2",time="7"}Learn principles of small group communication so you can function more effectively in groups, both in your personal life and in the workplace.

6 Lessons
Communicating More Effectively

{GENERICO:type="QuickInfo-2",time="7"}Explore topics including the leadership and management skills necessary in the different stages of group development, how to create an effective team, and how to harness a team's strengths.

21 Lessons
Communicating More Effectively

{GENERICO:type="QuickInfo-2",time="5"} Explore aspects that are important to employee job satisfaction and well-being, including conflict management and resolution.

16 Lessons

This course is designed for the novice who has little or no word processing experience; it provides an introduction to word processing. In it, you will explore word processing skills while also learning to create a basic business letter and a business memo.

24 Lessons
Computer Science

{GENERICO:type="QuickInfo-2",time="4"}Get a comprehensive introduction to spreadsheets that covers everything  first-time users need to know.

18 Lessons

Detailed survey of computers, computing, and programming, with a detailed emphasis on understanding of Object-Oriented Programming and exploration of different programming languages.  college credit, ace

60 Lessons

Introductory course that provides the basic concepts, nomenclature, and historical perspective of computers and computing. Includes an introduction to software development and Object-Oriented Programming.  college credit, nccrs, thomas edison, asba

84 Lessons
Computer Science

Introduction to the C++ computer programming language, focusing on syntax for primitive types, control structures, vectors, strings, structs, classes, functions, file I/O, exceptions and other programming constructs.  simca

56 Lessons

Introductory survey of the specification and implementation of basic abstract data types and their associated algorithms. Structures discussed include: stacks, queues, lists, sorting and selection, searching, graphs, and hashing; performance tradeoffs of different implementations and asymptotic analysis of running time and memory usage.  brandman

36 Lessons
Computer Science

Introduction to the mathematical foundations from discrete mathematics for analyzing computer algorithms, both for correctness and performance. Focuses on the introduction to models of computation, including finite state machines and Turing machines.  brandman

119 Lessons

This course provides students with an introduction to the core technologies used to communicate information on the Web: Hypertext Markup Language (HTML) and Cascading Style Sheets (CSS). These skills enable professionals to troubleshoot minor problems and to intelligently communicate with clients, collaborators, Information Technology staff within a company, or outside contractors in order to maintain, modify, or produce complicated web-based projects.

68 Lessons
Computer Science

Exploration of the basic hardware/software components, assembly language, and functional architecture design of computers, specifically focusing on instruction sets, processor arithmetic and control, the Von Neumann architecture, pipelining, memory management, storage, and other input/output topics. brandman

66 Lessons
Computer Science

Detailed introduction to the application of engineering approach to computer software design and development. Topics include: life cycle models, software requirements, specification, conceptual model design, detailed design, validation and verification, design quality assurance, software design/development environments and project management. brandman, simca, college credit, ace

67 Lessons
Computer Science

Detailed exploration of the mathematical techniques used for the design and analysis of computer algorithms. Topics include: the study of computer algorithms for numeric and non-numeric problems; analysis of time and space requirements of algorithms; correctness of algorithms and NP-completeness. brandman, simca

44 Lessons
Computer Science

Detailed introduction to programming language translation, including the functions and general organization of compiler design and interpreters. Focuses on the study of syntax, semantics, ambiguities, procedures replication, iteration, and recursion in these languages.brandman

73 Lessons
Computer Science

Detailed study that provides an understanding of Web-based application development, with particular emphasis on developing web applications using JavaScript, HTML, XML, AJAX, and Java Server Pages (JSP). brandman, simca

78 Lessons

Detailed study of trends in the development of applications for mobile devices, focusing on the unique design and deployment issues that must be taken into consideration when developing applications for mobile devices. simca

118 Lessons
Computer Science

Examination of the evolution of operating systems and design, focusing on hardware/software evolution leading to contemporary operating systems; basic operating systems concepts; methods of operating systems design and construction; algorithms for CPU scheduling, memory and general resource allocation; process coordination and management. brandman, simca

55 Lessons

Detailed introduction to the basic hardware and software, architectural components for computer communications in local area networks. The components that are focused upon include understanding the basics of computer networks, switching, routing, protocols and security.college credit, thomas edison, asba, tecep, simca, ace

98 Lessons

Study of database architecture and the components used in implementation. Using the Structured Query Language, topics including file structures and access methods; database modeling, design and user interface; components of database management systems; information storage and retrieval are explored.brandman

73 Lessons
Computer Science

Detailed exploration of the design space of programming languages, specifically the functional, imperative, logic and object-oriented programming languages. brandman

39 Lessons

Introduction to understanding the fundamental concepts and techniques of intelligent systems. Explores state-space and problem-induction representations of problems; Heuristic methods; Mechanical theorem proving and how these methods can be applied to artificial intelligence problems.brandman

28 Lessons
Computer Science

Introduction to the fundamentals of information security, computer security technology and principles, access control mechanisms, cryptography algorithms, software security, physical security, and security management and risk assessment.  brandman, simca

51 Lessons

Detailed examination of the concepts and methods of artificial intelligence. Topics include: heuristic search procedures for general graphs; game playing strategies; resolution and rule based deduction systems; knowledge representation; reasoning with uncertainty. brandman

66 Lessons
Computer Science

Study of the conventional encryption systems and classical cryptography, exploring the use of secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions.brandman

1 Lessons
Computer Science

Advanced study of topics in database systems, including query optimization, concurrency, data warehouses, object-oriented extensions, and XML. brandman, simca

43 Lessons

CSI Linux Open Source Intelligence (OSINT) Investigation In this course, we will be diving into the world of online investigations and research, and how to use Open Source Intelligence (OSINT) techniques to gather valuable information. We will cover everything from the base process of investigations, to preserving online evidence, and even utilizing AI challenges. By the end of the course, you will have the skills and knowledge necessary to conduct your own online investigations.Here is what you can expect from each section of the course:What is OSINT?In this section, we will define OSINT and its importance in today's world. You will learn how OSINT techniques and tools can be used to gather information that is publicly available and freely accessible.Base Process of InvestigationsWe will cover the basics of investigations, including how to set up an investigation, how to preserve online evidence, and how to identify and track phone numbers and IP addresses.Preserving Online EvidenceIn this section, we will discuss how to preserve online evidence, including what to look for when collecting data and how to document your findings.Phone Numbers and InfoWe will explore the various tools and techniques that you can use to gather information about phone numbers and other personal information.IP addresses, Proxies, and VPNsWe will discuss how to identify and track IP addresses, proxies, and VPNs, and the importance of anonymity when conducting online investigations.DNS, Domains, and SubdomainsWe will explore the various tools and techniques you can use to gather information about DNS, domains, and subdomains, and the importance of understanding this information for online investigations.Importance of AnonymityWe will discuss the importance of anonymity when conducting online investigations and how to protect yourself while online.Online Investigation SubjectsIn this section, we will explore the various types of online investigation subjects, including misinformation, disinformation, and deception.Setting up an Online Web Persona - Sock PuppetWe will discuss the process of setting up a fake online persona (or "sock puppet") and how it can be used in online investigations.Using your Sock Puppet Persona to InvestigateWe will explore how to use your sock puppet persona to conduct investigations, including how to interact with other users and gather information.Language Translation OptionsWe will discuss the various language translation options available to you, and how they can be used to gather information from non-English sources.Website CollectionWe will cover the various tools and techniques you can use to collect information from websites, including website crawlers and web scraping tools.3rd Party Commercial OSINT AppsIn this section, we will discuss the various 3rd-party commercial OSINT apps available to you, and how they can be used to gather information.OSINT Frameworks (tools)We will explore the various OSINT frameworks and tools that are available, and how they can be used to streamline your online investigation.Tracking changes on websitesWe will discuss how to track changes to websites and receive alerts when changes are made.Public Records SearchesWe will explore the various tools and techniques you can use to search public records, including online databases and archives.Geolocation TrackingIn this section, you will learn how to use geolocation tracking to gather information about an individual or location. You’ll learn about different tools and techniques, including GPS tracking and IP tracking.Online Investigations With ImagesIn this section, you will learn how to use images to gather information about an individual or location. You’ll learn about reverse image searches, facial recognition software, and more.Social Media SitesIn this section, you will learn how to use social media sites such as Facebook, Twitter, and LinkedIn to gather information about an individual or location. You’ll learn about different techniques, including social media scraping, and how to use the information you gather.Video Evidence CollectionIn this section, you will learn how to use video evidence to gather information about an individual or location. You’ll learn about different video sources, such as security cameras, and how to use the information you gather.CryptocurrencyIn this section, you will learn about the basics of cryptocurrency, including Bitcoin, and how it can be used in OSINT investigations. You’ll learn about different tools and techniques for tracking cryptocurrency transactions.AI ChallengesIn this section, you will learn about the challenges and opportunities posed by artificial intelligence in OSINT investigations. You’ll learn about different AI tools and techniques, including machine learning, and how to use them effectively.Writing the ReportIn this section, you will learn about the key components of a successful OSINT report. You’ll learn about different types of reports, including criminal investigations, and how to write a report that is clear, concise, and persuasive.Case StudiesIn this section, you will learn from real-life OSINT investigations. You’ll learn about different types of cases, including missing persons, and how OSINT was used to solve them.Practicing OSINT and ResourcesIn this section, you will learn about different resources and tools that can help you in your OSINT investigations. You’ll also have the opportunity to practice your OSINT skills and receive feedback from your instructor.So, are you ready to dive into the world of OSINT? Get started today and let’s start gathering information!

30 Lessons

This course covers how to get started with CSI Linux.What you will learnDownloading and installingInstalling the Virtual ApplianceInstalling onto a Bootable driveUpdating the systemRouting your traffic through TorUsing the CSI TorVPNUsing the CSI Gateway with Whonix Virtual Machine GatewayUsing the Case Management Systemand more...

20 Lessons
Retired Courses

CSI Linux Dark Web Investigation Certification CourseYou will learn about the basics of Dark Web investigations, including Dark Markets, Crypto Currency, tools to connect to Tor & I2P, and resources to help you investigate activity over Dark Web networks.   The main goal is to help gather and preserve evidence for court.The modules in this course cover: What is the Darknet/Dark Web, Preserving Online Evidence, Base Process of Investigations, Importance of Anonymity, Connecting to Tor, Navigating the Dark Web (Tor), De-Anonymizing Tor, Other Onion Routing Dark Nets, Setting up a Dark Web Persona, What is Crypto Currency, Dark Web Investigation Subjects, Resources, Writing the Report, Case Studies, and more.You will also be prepared to take the Certified Dark Web Investigator (CDWI) test.

23 Lessons

CSI Linux SOCMINTThis course's goal is to gather information on a suspect or target using their Social Media information. Do you want to know what your competitors or enemies know about you?  These are the same techniques we use during the reconnaissance or OSINT process but focus directly on the target's Social Media presence.The modules included are Importance of Anonymity, Base Process of Investigations, Preserving Online Evidence, Online Investigation Subjects, setting up a Sock Puppet, 3rd Party Commercial Apps, Terms of Service Challenges, tracking changes and getting alerts, Online Investigations with Images, Facebook, Twitter, Instagram, and others, Dating Sites, using your persona to investigate, Writing the Report, Case Studies, Practicing OSINT and Resources, and more

30 Lessons