Certified Web Intelligence Analyst

Today information is golden. Small, medium and large companies spend billions of dollars a year to build their customer database.  They spend less money, trying to protect this data. 

Companies that collect data via their website rely on their website developer to make sure their website is protected. The problem is that website developers are not hackers. 

In fact, a company's IT teams are not hackers.  How does one protect its company data from hackers?  By becoming a hacker and thinking like a hacker. 

The first step is to find out how vulnerable you or your clients are to hackers, identity thieves, cyber crooks, your competitors or anyone with a laptop and internet connection. That information can be used for any number of illegal activities, including cyber terrorism, industrial espionage, identity theft and cyber stalking.

This course dives right in on how to use the tools to get the information you are looking for.

What you will learn:

  • Learn how to use configure the Web Data Extractor tool
  • Learn how to extract phone numbers from a target website
  • Learn how to extract fax numbers from a target website
  • Learn how to extract email addresses from a target website
  • Learn how to find every URL on a target website
  • How to get Usernames from a website with out hacking
  • How to get Passwords from a website with out hacking
  • How to get Email list/addresses from a website with out hacking
  • How to get Sensitive documents from a website with out hacking
  • How to get Financial Information from a website with out hacking
  • Find a Website vulnerabilities
  • Monitor Any Website
  • How to bypass the Google custom search filter to access all of Google's databases
  • How to search all of Google at once for vulnerabilities
  • How to search specific websites for vulnerabilities
  • How to add a proxy to hide where your searches originate from
  • How to use dorks with the Bing search engine
  • How to determine what all a website links to
  • How to determine if there are any hidden or restricted URLs in a website
  • How to scan files you've downloaded for personally identifiable information such as credit card numbers, social security numbers, and patient records
  • How to scan flash files for vulnerabilities
  • How to use Google to scan for websites with open ports
  • How to use "NotInMyBackyard" to see if your name, username, social security number, or any other personally identifiable information has been posted on a public website or into cloud storage
  • How to look for a malicious executable file in websites
  • How to use dorks in Shodan to find more vulnerabilities
  • Learn how to find the list of IPs that the target website is using
  • Learn how and why to use the Wayback machine to view old copies of a website
  • Use the Netcraft tool to find all URLs in a target website and what operating systems the website uses
  • How to discover which of your devices are connected to the Internet, where they are located and who is using them
  • Keep track of all the computers on your network that are directly accessible from the Internet. Teach you how to understand targets digital footprint
  • Learn how to find every URL on a target website
  • Learn how to mirror a website
  • Learn how to configure the settings for maximum data gathering
  • Learn a few of the things you can do with a mirrored website
  • How to find almost anyone in the world online
  • How to build fake profiles to create a new social media profile or cyber space identity.
  • How to create Sock Puppets/fake accounts.
  • How to tell the difference between real news and fake news.
  • How to create fake news.
  • How to run background checks like the Private Investigators and Law Enforcement.
What is the average salary for jobs related to "Certified Web Intelligence Analyst"?

The average salary for "web intelligence analyst" ranges from approximately $61,301 per year for Intelligence Analyst to $106,342 per year for IT Security Specialist. Salary information comes from 29,952 data points collected directly from employees, users, and past and present job advertisements on Indeed in the past 36 months.

Course Curriculum

  1. 1
    • Instuctors

    • Support Chat/Forum

    • Course Discussion

    • What You Need To Get Started

    • Tools and Resources

  2. 2
    • Introduction To Protecting Your Identity

    • Fake Name Generators In Details

    • How To Create Fake Identities - Part 1

    • How To Create Fake Identities - Part 2

  3. 3
    • Dark Web The Unseen Side Of The Internet

    • Getting Started With The Dark Web - Part 1

    • Getting Started With The Dark Web - Part 2 - What is the TOR browser?

    • Getting Started With The TOR Browser - Configuration

    • Whonix ™ for Windows, macOS, Linux inside VirtualBox

    • The Do's And Don'ts Of The Dark Web

    • How To Stay Safe On Darknet Top Risks

    • How To Find Anything On The Dark Web

    • How To Buy Products On Dark Web Markets And Be Safe

  4. 4
    • Basic Reconnaissance Video

    • Basic Reconnaissance

  5. 5
    • Google Dorks Video

    • Google Dorks

    • Google API

    • Bing API Video

    • Shodan API Video

    • SearchDiggity Program for Windows

  6. 6
    • Web Data Extractor Tutorial

    • Web Data Extractor

    • Download Software To Extract Data

  7. 7
    • Website Copying

    • Download Software To Copy Websites

    • Website Copying Example

  8. 8
    • DNS Lookups

    • DNS Data View Program for Windows

    • DNS

  9. 9
    • WHOIS Lookups

    • Smart Whois Program for Windows

    • Overview of WHOIS Lookups

  10. 10
    • Website-Watcher Tutorial

    • Website-Watcher Program for Windows

    • Website Update Review

    • Website Update Monitoring

  11. 11
    • Looking for People Online

    • People Searching

  12. 12
    • Phishing

    • Phishing Review

    • Phishing Notes

  13. 13
    • Introduction

    • Installing google Chrome

    • X-New Tab Is Awesome

    • Essential Apps - Part 1

    • Essential Apps - Part 2

    • Getting Organized With Keyboard Shortcuts

    • Summary

  14. 14
    • Introduction

    • Google Home Page

    • Google Search Tools

    • Google Cached Pages

    • Google Similar Pages

    • Google Search Seetings

    • Google Advance Search

    • Narrow Down Advance Search

    • Narrow Down Advance Search

    • Summary

  15. 15
    • Introduction

    • First Advance Search With Operator

    • Google Site Operator - Part 1

    • Google Site Operator - Part 2

    • Google InUrl Operator

    • Google InTitle And InText Operator

    • Google Wildcard Operator

    • Google Social And Specific Search Operator

    • Google Related And Link Operator

    • Google Info Operator

    • Google Filetype Operator

    • Google Numeric Range Operator

    • Google Tilde Operator

    • Google Around Operator

    • Combining Operators

    • Google Site Structure Search

    • Summary

  16. 16
    • Introduction

    • Private Browsing In Google Chrome

    • Always Private Browing In Google Chrome

    • Private Brovsing In Mozilla FireFox

    • Always Private Browsing In Mozilla Firefox

    • Private Browing In IE

    • Private Brows In Opera

    • Private Browsing In Safari

    • Where To Find Shortcuts

    • Where To Find Shortcurts

    • Summary

  17. 17
    • Introduction

    • Google Images

    • Google News

    • Google Maps

    • Google Scholar

    • Google Patent

    • Google Book

    • Google Alerts

    • Google Videos

    • Google Translator

    • Google Other Products And Services

    • Summary

  18. 18
    • Exam - 1

    • Exam - 2

    • Exam - 2

    • Exam - 4

    • Exam - 5

    • Exam - 6

    • Exam - 7

    • Exam - 8

    • Exam - 9

  19. 19
    • Survey


A Certified Web Intelligence Analyst Shirt, Upon Completion.

Free shipping in the United States of America and Canada only.

Get A Discount

Get This Course For Less. Download The "National Cyber Security University" App To Get Weekly Discount Codes.