OSINT and Information Security Training

Information security and online presence is a relatively new frontier for government, law enforcement, private sector corporations, and individuals. Investigations are no longer initiated in the field. In today's modern world, we must keep up with the current techniques and methods to navigate and research effectively online.

Our training is primarily for government agencies, law enforcement, investigators, annalists, private corporations, and high net worth individuals. We offer effective search methods to aid investigations and also offer training on minimizing and redacting  individual and corporate information publicly available.

Demonstrating advanced search and analysis techniques for mining Web-based and social media information, this comprehensive training program will also examine a number of case studies that will focus on highlighting and correcting potential pitfalls that can compromise investigative or intelligence gathering efforts. As an additional training component, essential privacy tools for ensuring data, communication, and online security will be demonstrated, as will techniques being used by  the criminal element to conceal their identity, location, and illegal behavior.

Learn how to generate relevant, timely, and actionable intelligence, assess and manage risk, maximize opportunities, assure compliance, and manage reputation. Our OSINT training program will teach investigators how to conduct more effective online investigations, by finding better online information, in less time, at less cost, with less risk.

  • Advanced Search Techniques

  • Deconstructing Web Pages to Find Hidden Information

  • Techniques for “De-Anonymizing” Internet Users

  • The “Deep Web” – Public Directories and Databases

  • Multimedia Search Tools and Techniques

  • Crowd Sourcing and the “Real-Time” Internet

  • Online Intelligence Opportunities and Threats

  • Maintaining Security and Protecting Privacy

  • Locating and Linking People, Places, and Things

  • Determining Web Site and User Locations

  • Capturing, Organizing, and Storing Web-Based Evidence

  • Automated Mapping and Monitoring of Target Web Sites

  • Using RSS Feeds and News Aggregators

  • Forum, Discussion Board, and Newsgroup Search

  • Evaluation and Analysis of Internet-Sourced Data

  • Strategies and Tactics for Developing a Research Plan

  • Investigating Blogs, Wikis, and Social Networking Sites

  • The “Dark Web” – Hidden Online Criminal Marketplaces

  • Geo-Located Social Media Search and Collection Techniques

  • Thousands of Online Tools and Resources

  • Introduction to Open Source Intelligence

  • Intermediate and Advanced Search Tools and Techniques

  • Web Browsers

  • Deep Web, Crowd Sourcing, and Specialized Search Tools

  • Multimedia Search

  • Linking People, Places, and Things

  • Introduction to Intelligence Analysis

  • Source and Data Evaluation

  • Examining Web Sites

  • Recovering Lost and Removed Data

  • Privacy and Security

  • Advanced Data Analytics

  • Encryption

  • IP Address and WHOIS Lookups

  • TOR and the Dark Net

  • Bitcoin and Digital Currencies

  • Online Data Collection, Collation, and Storage Tools

  • Geo fencing and Live Web Monitoring

  • Social Networks and Online Communication Tools

  • Practical Search Exercises

  • Advanced Search Techniques

  • Strategies and Tactics for Developing a Research Plan

  • Deconstructing Web Pages to Find Hidden Information

  • Capturing, Organizing, and Storing Web Based Evidence

  • The Latest Online Anonymity and Encryption Tools for Devices and Computers

  • Maintaining Operational Security and Protecting Privacy

  • Techniques for De-anonymizing Online Targets

  • Crowdsourcing and Real Time Internet Intelligence Opportunities and Threats

  • Determining the Locations of Websites and Internet Users

  • Linking Entities & Creating Timelines

  • Overview of Call Detail Records and Software

  • IMEI’s & Call Location Data Analysis

  • The “Deep Web” Public Directories and Specialized Databases

  • Investigative Analysis on the “Dark Net”- an Hidden Criminal Online Marketplaces of Contraband

  • The Latest Tools for Collecting and Analyzing Social Media Intelligence

  • Geo located Social Media Search and Collection Techniques

  • Automated Mapping and Monitoring of Target Websites

  • Newly Emerging Discipline of Cyber-Psychology

  • Thousands of Online Tools and Resources to Improve the Efficiency of Online Research and Investigation