You'll learn all the methods, tactics, strategies tools, and sources to identify threat data targeting Western companies in China's ecosystem like a pro.
Dive into Clear, Deep, Dark Web
You will learn all things above and beyond for searching, finding context, understanding where, how to look for threat data and active targeting. You will also get everything you need about hacker slang, linguistic barriers and how to break them.
You will gain access to and create presence with your Chinese hacker avatars in any hacker forum, blog, board, resource, channel and group that Chinese hackers use. You will also learn about engagement elements and that extracting information isn't as intimidating in a foreign language.
PDF study book, with many visual illustrations, Tools, Tips, Methods, Case Studies, Exercises, Examples, Resources, and much more all related to searching China's hacker space.
We will support you in your learning journey with any question, assistance, whatever it is that you want or need help with to find in the context of China's hacker threat landscape.
Help find a tool? we will share tip on what to do, where to go, what to search, give examples and support via email.
You will learn to think creatively with us, not like a typical OSINT analyst, we bring to you that something extra.. a hacker mindset, how to access things despite their restrictions, how to think out of the box for OSINT.. is very much a skill you can take with you further in China OSINT and searching China's Hacker ecosystem.
Student, Singapore
$1,800
By completing the purchase you agree to terms and conditions below:
1. I CONFIRM THAT I HAVE READ THE ONLINE COURSES TERMS AND CONDITIONS CAREFULLY AND FULLY UNDERSTAND ITS CONTENTS AND ACCEPT IT OF MY OWN FREE WILL.
2. I HEREBY EXPRESSLY RECOGNIZE THAT BY ENROLLING IN THIS ONLINE COURSE I ACCEPT THAT THIS IS A CONTRACT PURSUANT TO WHICH I HAVE RELEASED ALL CLAIMS AGAINST FALCON, PROFESSIONAL SECURITY AND TRAINING LLC and EPCYBER.
3. BY SUBMITTING THIS ENROLLMENT FORM I UNANIMOUSLY AGREE TO THESE TERMS AND CONDITIONS.
Please reach us at team@epcyber.com if you cannot find an answer to your question.
This is for companies, professional services firms, and individuals who work in CTI (Cyber Threat Intelligence) and monitor actively different types of threats from language specific ecosystem, foreign ecosystem like China and cybercrime originating from China, tools, domestic scripts, domestic developments, hacker chatter, discussions, active targeting, everything that's hidden from Western intelligence analysts. Want to identify threat data like a pro? That course is for you.
Once you make the payment, we will simply your take the email address you used during payment with PayPal, and will reach out to you confirming details for further communication and delivery.
The enrollment process is very simple, only click on the "Buy button", complete the payment, and we will have your first name, last name, email address that we will further use to communicate + delivery materials.
After you pay, we will send out our first email to you, confirming your payment, in that email there will be a special code that is sent just for you uniquely, we will request you to send us that code back. When you send us the code back, it helps us to verify the accuracy of the email address, first name, last name for certificate data. Then after first email was confirmed by you, we send out a portion of the materials to you, following that portion of materials we request another code, this time confirming you've received that portion, after you confirm receipt of portion of materials, we send out everything else.
We use the information provided from your PayPal receipt after payment (Email address that will be used for all communication & delivery) (Mobile number if available in case there is a need to make a call to you), and Transaction number. - That is all.
That is fine, then just like in the case of companies buying for their employees, you simply reach out to us via the EPCYBER email address, and let us know if the transaction # + which email you'd like us to use to deliver materials + communication.
We only allow that if there are any errors or technical issues that do not allow you to get access to the materials (PDF), then in that case we will revoke access to the initial email address, and grant access to new one. But the most important thing is this = one student = one email address = one access only.
Same as regular registration, only that after you complete the payment, please write an email to EPCYBER at team@epcyber.com with transaction # + email address of the employee that will be used for communication and material delivery.
You are provided with premium support in this training, this means that you are actually encouraged to ask us as MANY questions that you need, from the simplest ones to more challenging ones to you. We get a lot of engagement from students because we verbally express the importance of communication, asking questions helps you understand better the content, the topic, and in the end of the day, helps you to grow. So.. don't hesitate to reach out anytime, with any China-related hacker content OSINT question.
You will be given access to this PDF for 6 months.
The PDF is not available for copy, download, transfer, printing, access is restricted only to one student, per one email address.
Copyright © 2022 EPCYBER INTELLIGENCE - All Rights Reserved.
team@epcyber.com | For questions about all offerings, content, courses, trainings, pricing, consultations, other questions.
cyber-academy@falcon-security.us| For technical questions about payment links, payment methods only.
Washington DC Metro Area
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.