Open Source Cyber Intelligence – Introduction
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
This Introduction to Open Source Intelligence (OSINT) course will provide delegates with skills to become more efficient and effective at finding those key pieces of intelligence on the Internet and World Wide Web.The next level will advanced tools that are vital for covert internet investigations and intelligence gathering.
This course is highly practical allowing delegates the time to explore and understand some of the hundreds of tools and websites available. and understand the tools and resources covered.”
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Use advanced search engine techniques and features
- Identify websites for finding information on people and companies
- Analyze website source code for investigative purposes
- Use deep web sites and directories
- Understand internet infrastructure and its use intelligence gathering and investigation
- Explain the digital footprint is left when online and the dangers associated
- Use social media for investigation, intelligence and geolocation
- Describe the best open source software to use for investigations
- Access influential internet communities
- You will also have an introduction to the Dark Web, criminal innovation and cybercrime
- Advanced search engine techniques and Google hacking
- How to describe the ways mobile devices can cause and opportunity and risk
- Tracking users with GPRS and SSID
- Advanced software required for safe internet investigations
- How to use open source encrypted anonymity services
- Familiarity with use of Tor and accessing Tor Hidden Services (THS) and other Dark Webs
- How Virtual currencies work, Particularly Bitcoin
-
COURSE AUDIENCE
This course is made for :
- Employees
- Engineer
- Developers
-
Anyone interested in Cyber Intelligence
-
COURSE OUTLINE
Day One
- Advanced search engine techniques and features
- The Identify websites for finding information on people and companies
- Analyze website source code for investigative purposes
Day Two
- Deep web sites and directories
- Internet infrastructure and its use intelligence gathering and investigation
- The digital footprint is left when online and the dangers associated
- social media for investigation, intelligence and geolocation
Day Three
- The best open source software to use for investigations
- Access influential internet communities
- Introduction to the Dark Web, criminal innovation and cybercrime
- Advanced search engine techniques and Google hacking
Day Four
- Describe the ways mobile devices can cause and opportunity and risk
- Tracking users with GPRS and SSID
- Advanced software required for safe internet investigations
Day Five
- Open source encrypted anonymity services
- Familiarity with use of Tor and accessing Tor Hidden Services (THS) and other Dark Webs
- Virtual currencies work, particularly Bitcoin
Keyword
Training Subject
Training Location