Open Source Intelligence for Corporate Security Professional
100 Orchard Road, Orchard Road, SingaporeTicket Information
- Additional fees may apply
Restrictions
Website
Listed by
Course Overview:
In this 3-day hands-on course, students will learn the tools and techniques used in the field of Open Source Intelligence. With special emphasis on social media monitoring, research and analysis, this training is designed to enable security professionals to better discover, evaluate and understand threats, and to conduct efficient online investigations on individuals and organizations.
Upon completion of the training, participants will gain better understanding of their role in the Intelligence Cycle, become familiar with a wide range of social media platforms and the tools and techniques that are needed in order to get the most out of these sources, be able to build a real-time threat-detection system and implement it on any computer, be able to conduct online investigations to uncover a target's background and network of contacts, while staying safe and not compromising their online identity, understand and use advanced analytic techniques.
Objectives:
Security professionals, analysts and investigators will understand the importance of OSINT for the corporate security industry, learn their role in the intelligence cycle; build a threat-detection system and conduct investigations, improve their analytic skills.
Level: Intermediate (3rd day: intermediate-advanced)
Topics Covered:
Day 1:
OSINT Usefulness and Relevance for Corporate Security: Use Cases
Threat detection
Unrest monitoring
Operating in high-risk regions
Due diligence and investigations
The Intelligence Cycle
Intelligence requirements
Monitoring and collection
Processing
Analysis
Dissemination
Preparing the Computer for Online Investigations:
Staying safe
Anonymity
How to not compromise your investigation
Day 2:
Building a Real-Time Alert System
Techniques
Keyword searches using boolean operators
Username lists
Geo-searches
Tools
Tweetdeck, Hootsuite
Conducting Investigations
Where to look: Sources
How to look: Tools and techniques
How it all comes together: What can we learn from a target’s name, username, email address, or phone number
Day 3 (intermediate-advanced):
Structured Analytic Techniques
Overview
Diagnostic techniques
Contrarian techniques
Imaginative thinking techniques
Exercises:
Devil’s Advocacy
Team A/Team B
“What If?” Analysis
Alternative Futures Analysis
Log in / Sign up
Continuing confirms your acceptance of our terms of service.
Post a comment