Course Methodology
This course uses a combination of presentations, group discussions, case studies and exercises based on real life situations.
Course Objectives
By the end of the course, participants will be able to:
- Identify definitions, meanings and the use of concepts and terms that are used in the OSINT field
- Analyze their organization’s intelligence requirements
- Develop an understanding of the intelligence lifecycle and the individual components contained within it
- Apply advanced search engine techniques to optimize search results
- Develop an awareness of some of the more common geolocation services available and how to exploit data from imagery for OSINT purposes
- Explain the digital footprint that is left when using the Internet, the dangers associated, and how proper tradecraft can protect against counter surveillance
- Comply with legal requirements and counter OSINT bias
Target Audience
This course is suitable for OSINT Investigators, Cyber Threat Intelligence Analysts, Financial Crimes Investigators, Human Resources Personnel, Insurance Investigators, Intelligence Personnel, Law Enforcement, Private Investigators and all Security Awareness Staff. It is also suitable for those in the IT field looking for an introduction to OSINT.
Target Competencies
- Legal Research
- Privacy Laws
- Data Protection
- Intelligence and Analysis
- Secure Operations and Incident Management
Overview of Open-Source (OSINT) Intelligence
- Identify definitions, meanings, and use of concepts and terms, that are used in the OSINT world
- The need for, and the benefits of, OSINT
Intelligence Requirements
- The organization’s intelligence requirements
- Where to find intelligence requirements
The Intelligence Lifecycle
- The intelligence lifecycle and the individual components contained within it
- The intelligence lifecycle requirements
Leveraging the Internet
- How search engines work
- The value of data online
- Analysis of high-profile data breaches
- Using advanced search engine techniques and features to optimize search results
Imagery Exploitation
- Introduction to how geolocation works
- Common geolocation services available, and how to exploit data from imagery for OSINT purposes
- Protecting organization assets from imagery or geolocation services
OSINT Tradecraft
- The digital footprint, the dangers associated, and protection against counter surveillance
- Legal compliance and counter OSINT bias