Sorry, this event’s been and gone


Mon Feb 25 2019, 12:00am
Tue Feb 26 2019, 12:00am
Wed Feb 27 2019, 12:00am–12:00am

Where: Concorde Hotel, 100 Orchard Road, Orchard Road, Singapore

Restrictions: All ages

Ticket Information:

  • Admission: $1,900.00
  • Additional fees may apply


Listed by: executivepr2

Course Overview:
In this 3-day hands-on course, students will learn the tools and techniques used in the field of Open Source Intelligence. With special emphasis on social media monitoring, research and analysis, this training is designed to enable security professionals to better discover, evaluate and understand threats, and to conduct efficient online investigations on individuals and organizations.

Upon completion of the training, participants will gain better understanding of their role in the Intelligence Cycle, become familiar with a wide range of social media platforms and the tools and techniques that are needed in order to get the most out of these sources, be able to build a real-time threat-detection system and implement it on any computer, be able to conduct online investigations to uncover a target's background and network of contacts, while staying safe and not compromising their online identity, understand and use advanced analytic techniques.

Security professionals, analysts and investigators will understand the importance of OSINT for the corporate security industry, learn their role in the intelligence cycle; build a threat-detection system and conduct investigations, improve their analytic skills.
Level: Intermediate (3rd day: intermediate-advanced)

Topics Covered:
Day 1:
OSINT Usefulness and Relevance for Corporate Security: Use Cases
Threat detection
Unrest monitoring
Operating in high-risk regions
Due diligence and investigations
The Intelligence Cycle
Intelligence requirements
Monitoring and collection
Preparing the Computer for Online Investigations:
Staying safe
How to not compromise your investigation

Day 2:
Building a Real-Time Alert System
Keyword searches using boolean operators
Username lists
Tweetdeck, Hootsuite
Conducting Investigations
Where to look: Sources
How to look: Tools and techniques
How it all comes together: What can we learn from a target’s name, username, email address, or phone number

Day 3 (intermediate-advanced):
Structured Analytic Techniques
Diagnostic techniques
Contrarian techniques
Imaginative thinking techniques
Devil’s Advocacy
Team A/Team B
“What If?” Analysis
Alternative Futures Analysis