In cooperation with Counterterrorism Certification Board
Open Source Intelligence (OSINT)
In this 3-day course and hands-on workshop, students will learn the tools and techniques used in the field of Open Source Intelligence. With special emphasis on social media monitoring, research and analysis, this training is designed to enable security professionals to better discover, evaluate and understand threats, and to conduct efficient online investigations on individuals and organizations. Upon completion of the training, participants will gain better understanding of their role in the Intelligence Cycle; become familiar with a wide range of social media platforms and the tools and techniques that are needed in order to get the most out of these sources; be able to build a real-time threat-detection system and implement it on any computer; be able to conduct online investigations to uncover a target’s background and network of contacts, while staying safe and not compromising their online identity; understand and use advanced analytic techniques.
Objectives:
Security professionals, analysts and investigators will understand the importance of OSINT for the
corporate security industry; learn their role in the intelligence cycle; build a threat detection system
and conduct investigations; improve their analytic skills
Level:
Intermediate (3rd day: intermediate-advanced)
DAY 1
• OSINT Usefulness and Relevance for Corporate Security: Use Cases
• Threat detection
• Unrest monitoring
• Operating in high-risk regions
• Due diligence and investigations
• The Intelligence Cycle
• Intelligence requirements
• Monitoring and collection
• Processing
• Analysis
• Dissemination
• Preparing the Computer for Online Investigations:
• Staying safe
• Anonymity
• How to not compromise your investigation
DAY 2
• Building a Real-Time Alert System
• Techniques
• Keyword searches using boolean operators
• Username lists
• Geo-searches
• Tools
• Tweetdeck, Hootsuite
• Conducting Investigations
• Where to look: Sources
• How to look: Tools and techniques
• How it all comes together: What can we learn from a target’s name, username, email
address, or phone number
DAY 3 (intermediate-advanced)
• Structured Analytic Techniques
• Overview
• Diagnostic techniques
• Contrarian techniques
• Imaginative thinking techniques
• Exercises:
• Devil’s Advocacy
• Team A/Team B
• “What If?” Analysis
• Alternative Futures Analysis
Contact:
Anton Sim +62813-8332-6388 (Phone/WA)
antonsim@heilandsolutions.com
Reviews
There are no reviews yet.