Dark Web 2 – CTI Researcher

In the first course of the Dark Web Path, Dark Web and Cybercrime Investigations, we dipped a toe in the waters to offer a glimpse into the seedy underbelly of the Internet. You learned the history of the dark web and an overview of what it takes to deliver an Investigative Report from the perspective of the job of an Analyst. Get your hoodie ready for Dark Web 2!

In DW2, John Hammond dons the Researcher Black Hat to dive head-first into the deep end of the Dark Web on a hunt for actionable Cyber Threat Intelligence. It’s not that the Investigator doesn’t explore the Dark Web. But a Researcher utilizes a hacker mindset and a hacker’s toolset to reveal hidden truths and connections that not only provide the empirical evidence for international law enforcement to take down criminal enterprises but also help organizations bolster their cybersecurity programs.

This sequel course includes hands-on activities and a cloud-based VM for you to hunt from a protected environment.

๐Ÿ›‘ You Will See Things You Can’t Unsee! ๐Ÿ›‘

This course is not for the faint of heart. But if you truly want to tip the scales of justice, you have to understand the ecosystem at every level.

If you haven’t clicked away, then this is the course for you!


Dark Web Path

Bundle = 25% Off the Dark Web Path


Price = $175

What will I learn in Dark Web 2?

Course Contents:

0๏ธโƒฃ Introduction
1๏ธโƒฃ Navigating the Dark Web & Tor Resources
2๏ธโƒฃ Infostealers & Malware-as-a-Service
3๏ธโƒฃ Threat Actor Profiling
4๏ธโƒฃ Tracking & Monitoring Cybercriminal Operations
5๏ธโƒฃ Cybercriminal Communications & Infiltration
6๏ธโƒฃ Bulletproof Hosting Service & Cybercriminal Infrastructure
7๏ธโƒฃ Law Enforcement Takedowns & Case Studies
8๏ธโƒฃ Resources, Further Learning & Your Career
9๏ธโƒฃ Wrap Up

What is the format of this course?

This course follows a pattern of having “Chapters” that contain “Lessons“. The first several Chapters have interactive exercises that can be done in your choice of environments:

  1. Download the Exercise Files to your own machine and complete them locally.
  2. Complete the same tasks in one of 2 provided VMs, Windows or Linux. They both have the same required tools, so you only need to pick one. Whatever is most comfortable for you!

Each chapter culminates in a quiz, and you must pass each quiz in order to continue. All the information needed to pass the quizzes are contained in the materials of the course.

Who should take Dark Web 2?

Cyber threat intelligence is not a single job. It is a cluster of roles that sit between technical security work, investigative research, and communication. This course has focused on dark web and cybercrime investigations, but the skills involved map into a wide range of positions.

Instead of pasting the content from the course that addresses in detail who would benefit from this course, we decided to make the entire lesson, ๐Ÿ’ผ Career Opportunities, available as a Free Preview!

Prerequisites for Dark Web 2

This course can stand-alone and does not require that you’ve taken the first Dark Web course, although it will assume you already know what the dark web is, have some technical experience and be comfortable in virtual environments. It’s also helpful to be comfortable with the command line, Python and a few other somewhat basic skills.

This course gives students the option to play on their own or utilize a dedicated virtual machine. Because everything is provided for you, you need nothing other than a computer, Internet access and a hacker mindset!


Just Hacking Training (JHT) Logo
Affordable Hands-On Cybersecurity Training from Co-Founder John Hammond & 30+ All-Stars

Hardware Hacking 101 Is Here!

20% Off Launch Discount All Month
HH101 with Custom Kit only $280!


Say Hi in SF!

Play our 2 new Extended Upskill Challenges with VMs in the IoT Village at both BSidesSF and RSAC. Or Free NOW on JHT!


Recent Releases

- Courses: WMD 5, SIEMless Threat Hunting, Ransomware Analysis
- Bundles: 25% Off Dark Web 1 & 2,
50% Off 7 CTFs, 75% Off 7 HALs
- Free UCs: Proxmox, Metasploit, UCx - QEMU, UCx - mitmproxy, Maritime Cybersecurity, APIs in PowerShell 7, Nessus
- Blogs: Brief History of ConDef Ecosystem,ย  ConDef MCP โ€“ Meet Your AI Teaching Asst, Blue Team Training Roadmap


Start Windows Malware Dev

WMD 1 = $40
WMD Intro Path (1-3) = 46% Off


ย 

Top Picks

The Mishaal Bundle, ConDef 2026, API Hacking, Phishing, SOC Analyst 101


Courses In Production

WMD 6, Jr WebApp Pentester, Jr Network Pentest, OS Hardening...