­
  • Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles

Call us Anton +62-813-8332-6388 (Phone/WA/Telegram)

antonsim@heilandsolutions.com
Rp 0
No products in the cart
Go to shop
Heiland Consulting & TrainingHeiland Consulting & Training
Heiland Consulting & TrainingHeiland Consulting & Training
  • Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles
🔍
Open Source Intelligence (OSINT)

Open Source Intelligence (OSINT)

Rp 20.000.000

In this 3-day course and hands-on workshop, students will learn the tools and techniques used in the field of Open Source Intelligence. With special emphasis on social media monitoring, research and analysis, this training is designed to enable security professionals to better discover, evaluate and understand threats, and to conduct efficient online investigations on individuals and organizations. Upon completion of the training, participants will gain better understanding of their role in the Intelligence Cycle; become familiar with a wide range of social media platforms and the tools and techniques that are needed in order to get the most out of these sources; be able to build a real-time threat-detection system and implement it on any computer; be able to conduct online investigations to uncover a target’s background and network of contacts, while staying safe and not compromising their online identity; understand and use advanced analytic techniques.

Category: Intelligence/Investigation.
4
Share
  • Description
  • Reviews (0)

In cooperation with Counterterrorism Certification Board

Open Source Intelligence (OSINT)

In this 3-day course and hands-on workshop, students will learn the tools and techniques used in the field of Open Source Intelligence. With special emphasis on social media monitoring, research and analysis, this training is designed to enable security professionals to better discover, evaluate and understand threats, and to conduct efficient online investigations on individuals and organizations. Upon completion of the training, participants will gain better understanding of their role in the Intelligence Cycle; become familiar with a wide range of social media platforms and the tools and techniques that are needed in order to get the most out of these sources; be able to build a real-time threat-detection system and implement it on any computer; be able to conduct online investigations to uncover a target’s background and network of contacts, while staying safe and not compromising their online identity; understand and use advanced analytic techniques.

Objectives:
Security professionals, analysts and investigators will understand the importance of OSINT for the
corporate security industry; learn their role in the intelligence cycle; build a threat detection system
and conduct investigations; improve their analytic skills
Level:
Intermediate (3rd day: intermediate-advanced)
DAY 1
• OSINT Usefulness and Relevance for Corporate Security: Use Cases
• Threat detection
• Unrest monitoring
• Operating in high-risk regions
• Due diligence and investigations
• The Intelligence Cycle
• Intelligence requirements
• Monitoring and collection
• Processing
• Analysis
• Dissemination
• Preparing the Computer for Online Investigations:
• Staying safe
• Anonymity
• How to not compromise your investigation
DAY 2
• Building a Real-Time Alert System
• Techniques
• Keyword searches using boolean operators
• Username lists
• Geo-searches
• Tools
• Tweetdeck, Hootsuite
• Conducting Investigations
• Where to look: Sources
• How to look: Tools and techniques
• How it all comes together: What can we learn from a target’s name, username, email
address, or phone number
DAY 3 (intermediate-advanced)
• Structured Analytic Techniques
• Overview
• Diagnostic techniques
• Contrarian techniques
• Imaginative thinking techniques
• Exercises:
• Devil’s Advocacy
• Team A/Team B
• “What If?” Analysis
• Alternative Futures Analysis

Contact:
Anton Sim +62813-8332-6388 (Phone/WA)
antonsim@heilandsolutions.com

Reviews

There are no reviews yet.

Be the first to review “Open Source Intelligence (OSINT)” Cancel reply

Your email address will not be published. Required fields are marked *

1 of 5 stars 2 of 5 stars 3 of 5 stars 4 of 5 stars 5 of 5 stars

Related products

Add to cart View Details

Monitoring Extremist Groups on Telegram (Online)

Intelligence/Investigation
5
Rp 2.000.000
Add to cart View Details

Twitter for Security: Real-time Information Discovery and Threat Detection (Online)

Intelligence/Investigation
1
Rp 2.000.000
Add to cart View Details

Online Investigation (Online)

Intelligence/Investigation
2
Rp 2.000.000

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message

heilandsolutions

heilandsolutions

Contact Info

  • Anton Sim
  • +62 813 8332 6388/+62 811 805 434 (Call/WhatsApp/Telegram)
  • antonsim@heilandsolutions.com ask@heilandsolutions.com

© 2025 · www.heilandsolutions.com