Dark Web Forensics (DWF)

About the Course In this workshop you will be given a tour of the dark web and walked through the technical details of how it works. You will get hands-on experience conducting dark web investigations. This includes how to identify relevant information and how to investigate it. WARNING: The content in this video contains potentially offensive […]

Learn at Your Own Pace

With the Self-Study option, you get:

  • Full access to course content
  • The freedom to study anytime, anywhere
  • No deadlines or pressure — you set your own pace

EC Council

Delivered in partnership with EC-Council, the world’s leading cybersecurity certification body—home of CEH, CHFI, and CCISO.

Course Summary

Choose Your Course Options
Price
300,00  + VAT

Trainee details

About the Course

In this workshop you will be given a tour of the dark web and walked through the technical details of how it works. You will get hands-on experience conducting dark web investigations. This includes how to identify relevant information and how to investigate it.

WARNING: The content in this video contains potentially offensive topics and adult content. Viewer discretion advised. You must be 18 and over to take this workshop!

Course Outline

I. Technical background
II. Tour of markets
III. Investigative techniques

Workshop Disclaimer:
This version of The Dark Web Forensic Deep Dive contains some content that has been redacted. An un-redacted version is available for law enforcement, please contact us here for more information.

Who should Attend

This training is useful for any forensic investigator but is particularly interesting to those trying to trace data leaks, financial crimes, and cyber-related crimes. This workshop includes hands-on labs.

Disclaimer: You must be 18 and over to take this workshop!

Objectives

  • An overview and exploration of the dark web
  • Review of the technologies involved
  • Review of existing markets
  • Discussion of search methods
  • How to create an identity for investigation
  • Vulnerability scanning the dark web
  • Breaching markets
  • Crawling the dark web
  • Tools used
  • TAILS
  • Onion Crawler

    About the course:

    Need a Personalized Quote?Get in Touch!

    For bulk enrollments or special pricing options, request a customized quote.
    PRINCE2®, PRINCE2 Agile® and ITIL® are registered trade marks of AXELOS Limited, used under permission of AXELOS Limited. The Swirl logo™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.

    PNRR. Finanțat de Uniunea Europeană – UrmătoareaGenerațieUE

    Conținutul acestui material nu reprezintă în mod obligatoriu poziția oficială a Uniunii Europene sau a Guvernului României
    Stay Up-to-Date!
    Stay updated with the latest news and insights by joining our newsletter! Sign up today to receive exclusive content, tips, and special offers tailored just for you.

    © 2026 · RQM CERT · All Rights Reserved
    This website is managed by RQM Certification SRL, VAT no. RO34221359, Reg. no. J35/591/2015, headquartered at Str. Marginii no. 4, Corp A, Ap. 6, Timișoara, Romania.