0845 450 6120

OSI Open Source Intelligence Investigators: Introduction

This course will familiarise delegates with Open Source investigator and the tools available to effectively trace data and information about users, the networks and social network sites they interact with, and the digital footprint they leave. It is suitable for Law Enforcement professionals looking to understand more about online tools and capabilities to build profiles, but is also a good introductory course for those from a non-LEA background who need to understand more about Open Source and obtainable data.

The World Wide Web (WWW) and the Internet are the communication channels and meeting places in the 21st Century. This course looks at how, what, where and why useful intelligence is recorded, as well as how the investigator can recognise where to find the information and how to use it. It includes hands-on, real-time tracing of profiles and data searches.

We don't currently have any courses listed for OSI Open Source Intelligence Investigators: Introduction, would you like to view all courses for Information & Cyber Security?

Learning Objectives

Delegates will learn how to

  • The Internet, the world wide web (WWW) and the dark web
  • How we interact with the web and where we leave a trace
  • How devices interact with the network and how this can be exploited
  • Internet Human anthropology
  • Social engineering basics
  • Social networking sites- structure and use
  • Cybercrime trends and methods
  • IP basics and what they can tell us
  • Apps and software - how can we use them
  • Digital profiling
  • Data bases and tools

Pre-Requisites

None - although a basic knowledge of how the Internet and social networking sites work would be an advantage. This course is the pre-requisite to the three day advanced course.

Course Content

Part 1 - Introduction to how you use the Internet to communicate and how we interact with it

Part one will raise awareness of how people interact with the Internet, social networking sites, methods and devices; how individuals give up sensitive data, willingly or through social engineering; human and social anthropology (virtually).

Part 2 - How and where to look for data/ Intelligence

This section will raise the student's awareness of where and how to look for personal data put on the web, what is out there, and what people can access (both with and without legal authorities).

Part 3 - Tools available to the investigator

The students will be walked through basic tools to enable them to trace data, build profiles and association to others. They will then be tasked to trace data on specially created QA profiles and hidden intelligence.

One Month
Two Months
Three Months
More than Three Months
PRINCE2 Foundation & Practitioner
MSP Foundation & Practitioner
APMP Certificate
ITIL Foundation
Scrum in One Day
Certified ScrumMaster
ISTQB Software Test Foundation
Microsoft Project
BCS Business Analysis Practice
Other - Please Specify Below

Our Customers Include