When conducting open source intelligence targeting and collection, we must ensure our efforts support stakeholder’s intent, the impact the collection will have on the business, and any potential business and technology shifts the results may produce.
One of the main benefits of open source collection is the ability to share our findings with internal and external partners. We can benefit greatly from information exchanges that foster a common view of the operating environment while building trust through sharing.
This course takes you through standard definitions, why and how OSINT will benefit your organization, the framework for collecting information and the application of OSINT to live situations. This course gives you the skills necessary to orderly plan and collection open source data and information. We focus on:
Additional OSINT web resources Documentation application/Hunchly Metadata
Addresses, phone numbers, user names, emails Effective Research Habits Methods of collection – Tools
Advance search methods for blogs and social networks Email, Phone Address, People Methods of secure communication
Advanced Search Techniques Email, Phone, Address, People Methods of Social Media Research
Advanced search techniques Engaging your target Methods that may reveal what OSINT is doing to a target
Analyze the text Establish links to performance metrics Mobile OSINT
Analyzing data Evaluate OSINT for Collection platform Monitoring for change
Analyzing, organizing, and preparing of written reports Explain the SWOT of OSINT Networking and VPNs
Approaches to Searching Extensive OSINT lists News Media Content
Apps & Utilities Forums, discussion boards, newsgroups Note-taking applications
Archiving methodologies and extraction tools Fundamentals of OSINT On line database systems
Assess OSINT’s role Gathering data Online privacy / anonymity tools
Backlinks Gathering requirements Open Source Data
Basic Internet Geolocation methods Opinion Community
Basic Search Techniques Geolocation tools OPSEC
Benefits Geospatial Analysis Optimizing transfer of large files
Best ways to use screen shot capabilities Glossary and Taxonomy Organize, Analyze, Summarize & Report – Report Your Results Easily in a Formal Report
Blogs and wikis Goals of OSINT Collection OSINT Collection and Production.
Business Sites Google Custom Search Engine, Alerts, Scholar, News OSINT Collection Planning – Cyber Operations Order
Buzz campaign Google dorks and Google Hacking database OSINT Communities
Cast a wide net Google Guide OSINT Methodology
Chat Windows Google Hangouts OSINT Subtypes
Cloud server Government – Media Other Open Sources
Collection, Process, Exploitation, Production Gray Literature Password management
Content Analysis How to document Pay Databases – Best systems to utilize, Cost Efficient Approaches, Pros and Cons
Counterintelligence techniques used by the criminal elements Identifying fraudulent opinions People search
Creating an inviting environment Image recognition technology Planning and direction
Creating and manipulating the buzz Instant Messaging Planning for OSINT Collection & Analysis
Creating output for customer Intelligence integration Privacy and Proxies – Protect Yourself First
Cyber Criminals International Search Engines and Tools Privacy and Security Settings
Cyber HUMINT – Social Media Lecture on Intelligence and Cyber Intelligence Publication Access
Data Provenance - Hunch.ly Link Analysis Query Input
Deep Web Part 1 – People Searches Maltego, Spiderfoot, Paliscope, Shodan, ORYON, OSINT Browser, Buscador Quick Reference
Deep Web Part 2 – Public Records Managing social media communities Real Time News
Deep Web Part 3 – Social Networks, Blogs, Forums and Social Media Search Tips Measure what matters Review and use of open source tools
Determining Your Threat Profile Media – Image, Video, & Documents Sanitizing your platform
Discussion Forums Media Image, Video & Document Screenshots
This email address is being protected from spambots. You need JavaScript enabled to view it.
331.999.0071 Office
508.519.0363 Fax