

Certificate in Open-Source Intelligence (OSINT) Fundamentals
DATE
12 - 16 Jun, 2023
LOCATION
To Be Determined;
Why Attend?
Certificate in Open-Source Intelligence (OSINT) Fundamentals
Course Objectives
-
By the end of the course, participants will be able to:
- Identify definitions, meanings and the use of concepts and terms that are used in the OSINT field
- Analyze their organization’s intelligence requirements
- Develop an understanding of the intelligence lifecycle and the individual components contained within it
- Apply advanced search engine techniques to optimize search results
- Develop an awareness of some of the more common geolocation services available and how to exploit data from imagery for OSINT purposes
- Explain the digital footprint that is left when using the Internet, the dangers associated, and how proper tradecraft can protect against counter surveillance
- Comply with legal requirements and counter OSINT bias
Target Audience
This course is suitable for OSINT Investigators, Cyber Threat Intelligence Analysts, Financial Crimes Investigators, Human Resources Personnel, Insurance Investigators, Intelligence Personnel, Law Enforcement, Private Investigators and all Security Awareness Staff. It is also suitable for those in the IT field looking for an introduction to OSINT.
- Overview of Open-Source (OSINT) Intelligence
- Identify definitions, meanings, and use of concepts and terms, that are used in the OSINT world
- The need for, and the benefits of, OSINT
- Intelligence Requirements
- The organization’s intelligence requirements
- Where to find intelligence requirements
- The Intelligence Lifecycle
- The intelligence lifecycle and the individual components contained within it
- The intelligence lifecycle requirements
- Leveraging the Internet
- How search engines work
- The value of data online
- Analysis of high-profile data breaches
- Using advanced search engine techniques and features to optimize search results
- Imagery Exploitation
- Introduction to how geolocation works
- Common geolocation services available, and how to exploit data from imagery for OSINT purposes
- Protecting organization assets from imagery or geolocation services
- OSINT Tradecraft
- The digital footprint, the dangers associated, and protection against counter surveillance
- Legal compliance and counter OSINT bias
Join Our Community