Certificate in Open-Source Intelligence (OSINT) Fundamentals

Certificate in Open-Source Intelligence (OSINT) Fundamentals

Product Code: تدريب حضوري
Product available in stock : 1000
  • $3,500.00

  • Ex Tax: $3,500.00

Available Options


Tags: Certificate in Open-Source Intelligence (OSINT) Fundamentals

Course Methodology

This course uses a combination of presentations, group discussions, case studies and exercises based on real life situations. 

Course Objectives

By the end of the course, participants will be able to:

  • Identify definitions, meanings and the use of concepts and terms that are used in the OSINT field
  • Analyze their organization’s intelligence requirements
  • Develop an understanding of the intelligence lifecycle and the individual components contained within it
  • Apply advanced search engine techniques to optimize search results
  • Develop an awareness of some of the more common geolocation services available and how to exploit data from imagery for OSINT purposes
  • Explain the digital footprint that is left when using the Internet, the dangers associated, and how proper tradecraft can protect against counter surveillance
  • Comply with legal requirements and counter OSINT bias

Target Audience

This course is suitable for OSINT Investigators, Cyber Threat Intelligence Analysts, Financial Crimes Investigators, Human Resources Personnel, Insurance Investigators, Intelligence Personnel, Law Enforcement, Private Investigators and all Security Awareness Staff. It is also suitable for those in the IT field looking for an introduction to OSINT.

Target Competencies

  • Legal Research
  • Privacy Laws
  • Data Protection
  • Intelligence and Analysis
  • Secure Operations and Incident Management

Overview of Open-Source (OSINT) Intelligence

  • Identify definitions, meanings, and use of concepts and terms, that are used in the OSINT world
  • The need for, and the benefits of, OSINT

Intelligence Requirements

  • The organization’s intelligence requirements
  • Where to find intelligence requirements

The Intelligence Lifecycle

  • The intelligence lifecycle and the individual components contained within it
  • The intelligence lifecycle requirements

Leveraging the Internet

  • How search engines work
  • The value of data online
  • Analysis of high-profile data breaches
  • Using advanced search engine techniques and features to optimize search results

Imagery Exploitation

  • Introduction to how geolocation works
  • Common geolocation services available, and how to exploit data from imagery for OSINT purposes
  • Protecting organization assets from imagery or geolocation services

OSINT Tradecraft

  • The digital footprint, the dangers associated, and protection against counter surveillance
  • Legal compliance and counter OSINT bias 

Write a review

Note: HTML is not translated!
    Bad           Good