0845 450 6120

OSI Open Source Intelligence Investigators: Advanced

This course provides delegates an advanced knowledge of Open Source investigator and the tools available to effectively trace data and information about users, the networks and social network sites they interact with, and the digital footprint they leave. It is suitable for Law Enforcement professionals looking to understand more about online tools and capabilities to build profiles, but is also a good course for those from a non-LEA background who need to understand more about Open Source and obtainable data.

The World Wide Web (WWW) and the Internet are the communication channels and meeting places in the 21st Century. This course looks at how, what, where and why useful intelligence is recorded, as well as how the investigator can recognise where to find the information and how to use it. It includes hands-on, real-time tracing of profiles and data searches.

We don't currently have any courses listed for OSI Open Source Intelligence Investigators: Advanced, would you like to view all courses for Information & Cyber Security?

Learning Objectives

Delegates will learn how to

  • The Internet, the world wide web (WWW) and the dark web
  • How we interact with the web and where we leave a trace
  • How devices interact with the network and how this can be exploited
  • Internet Human anthropology
  • Social engineering
  • Social networking sites- structure and use
  • Cybercrime trends and methods
  • Apps and software - Advanced techniques
  • Data bases and tools
  • Covert and protected software available
  • Evidential capture
  • Masking technology
  • Digital profiling
  • Manhunts
  • Legislation - constraints, pitfalls and advantages
  • Safeguards when searching Proxies, Virtual machines
  • Computer security and footprints
  • Port scanning and vulnerability exploitation
  • Traceability and DNS data mining
  • Attribution via CCTV/ANPR/ etc.
  • Email header analysis
  • Darkweb, deepnet and TOR
  • Wi-Fi and GPRS opportunities
  • MAC addresses and SSID opportunities
  • Remote device identification
  • IP geolocation
  • Future/ horizon scanning
  • Covert internet investigations
  • Managing collateral intrusion
  • Reverse and social engineering
  • Possible missed opportunities
  • Thinking outside the box

Pre-Requisites

A basic understanding of OSI Open Source Intelligence or attendance on an introductory course

Course Content

Part 1 - Introduction to How the Internet is used to communicate and how we interact with it

The first section builds upon basic awareness of how people interact with the Internet, social networking sites, methods and devices; how individuals provide sensitive data willingly or through Social engineering; Human and social anthropology (virtually); Advanced data exploitation and DNS tools (Darkweb and TOR).

Part 2 - How and where to look for data/ Intelligence

This section raises the student's awareness of where and how to look for personal data to an advanced level; what is out there, what can access (both with and without legal authorities). MAC, SSID, IP geolocation, GPRS, Cell site data exploitation.

Part 3 - Tools available to the investigator


The students will be walked through advanced tools to enable them to trace data, build profiles and association to others. They will then be tasked to trace data on specially created QA profiles and hidden intelligence at an advanced level. Real-time device tracking, non-visual surveillance.

One Month
Two Months
Three Months
More than Three Months
PRINCE2 Foundation & Practitioner
MSP Foundation & Practitioner
APMP Certificate
ITIL Foundation
Scrum in One Day
Certified ScrumMaster
ISTQB Software Test Foundation
Microsoft Project
BCS Business Analysis Practice
Other - Please Specify Below

Our Customers Include