Advanced Open-Source Intelligence (OSINT) Gathering and Analysis
With Open-Source Intelligence (OSINT) being the engine of most major investigations in this digital age the need for a more advanced course was imminent. The data in almost every OSINT investigation becomes more complex to collect, exploit and analyze. For this OSINT practitioners all around the world have a need for performing OSINT at scale and means and methods to check and report on the reliability of their analysis for sound and unbiased reports.
Course Key Learnings:
- Structured intelligence analysis
- Rating the reliability of information and its sources
- Researching sensitive and secretive groups
- Practical and Advanced Image and video analysis and verification
- Dark web and criminal underground investigations.
- Operational Security (OPSEC) for OSINT
- Fact-checking and analysis of disinformation and misinformation
- Knowing cryptocurrency fundamentals and tracking
- Using basic coding to facilitate information collection and analysis
- Interacting with APIs for data collection and filtering
- Conducting internet monitoring
- Automation techniques to support OSINT processes
Course Module1: Disinformation and Coding for OSINT Efficiency
Overview
We live in an information age where disinformation is becoming more and more common.
In the first section of day 1 students will learn what disinformation is by understanding how disinformation campaigns are set up and deployed.
The rest of day one serves as an introduction to coding automation techniques for OSINT and teaches students how to efficiently collect and analyze large quantities of information. The basics of simple scripts are covered, along with simple techniques for manipulating data that has been collected. JavaScript Object Notation (JSON) data is commonly encountered by OSINT analysts and must be appropriately collected, filtered, manipulated, and searched to be leveraged in an investigation.
Topics
- Detecting and analyzing disinformation and fake news
- Using shell utilities for OSINT data collection and analysis
- Determining file and data types
- Working with structured and unstructured data
- Normalization of data for analysis
- Analyzing large sets of data
- Searching and extracting specific data from a dataset
- Understanding and parsing JavaScript Object Notation data
- Introduction to Application Programming Interfaces (APIs)
Module2: Intelligence Analysis and Data Analysis with Python
Overview
Standard intelligence information analysis techniques and processes for assessing the reliability of information are a key element of intelligence, and application of these techniques to OSINT are discussed.
We close off day one with an advanced section on how to analyze gathered OSINT information using several reliability rating and analytic assessment techniques such as Admiralty code, Analysis of Competing Hypothesis and CRAAP analysis. These techniques will help students to make their overall analysis outcome become more solid.
Topics
- Understanding reliability rating models for OSINT
- Rating the reliability of information
- US Army OSINT and the Admiralty/NATO system
- Currency, Relevance, Authority, Accuracy & Purpose (CRAAP)
- Standard intelligence assessment techniques
- Analysis of Competing Hypotheses (ACH) and other methods
- Sharing and organizing data on GitHub
- Fundamentals of the Python programming language
- Data collection via API using Python
- Data analysis with Python and Pandas
Module3: Sensitive Group Investigations and Video and Image Verification
Overview
The beginning of day three is about how to analyze sensitive groups and individuals who identify with groups online. This is becoming increasingly important because many of the targets of OSINT work may be individuals who like to identify themselves within a group or are part of a group.
Students will also learn practical and advanced image and video verification techniques.
Topics
- Use of Unique Identifying Labels (UILs)
- Identifying Sensitive Groups using UIL techniques
- Investigate and link individuals using UILs
- Discovering the nexus of hate groups and victims
- Practical and Advanced Image and video verification techniques
Module4Sock Puppets, OPSEC, Dark Web and Cryptocurrency
Overview
This day starts off with instruction on useful concepts for creating and maintaining fictitious identities (sock puppets), particularly those used to interact with others, and how to maintain Operations Security (OPSEC). Within SEC587 students will get a more advanced understanding of how OSINT techniques can be applied on the Dark Web by learning about dark web networks. Students will learn techniques for collecting information on the dark web from private groups and underground forums or marketplaces. We will close of this day with an examination of the fundamentals of cryptocurrency, and techniques for tracking public cryptocurrency transactions.
Topics
- Creating and maintaining false personas
- Communicating with targets and other sources of information
- Operational security (OPSEC)
- Dark web basics
- Decentralized DNS systems
- Searching for dark web content
- Essential cybercrime underground concepts
- Underground marketplaces, shops and forums
- Understanding cryptocurrency and the blockchain
- Investigating cryptocurrency wallets and transactions
Module5: Automated Monitoring and Vehicle Tracking
Overview
Day five will start with tools and techniques that will aid OSINT analysts in using and building their own monitoring and online searching tools. This section will teach students how to utilize third party web-based monitoring tools as well as how to monitor various topics of interest. Students will also learn how to find, gather, and analyze everything that is related to vehicles (cars, boats, planes, trains etc.) using open-source information.
Topics
- Practical OSINT monitoring using web services
- Automated internet monitoring using third-party tools
- Visualization of data sets to support network analysis
- Collection and analysis of open-source vehicle tracking information
Course Prerequisites
- Basic knowledge and experience with open-source intelligence collection.
- Rudimentary understanding of intelligence analysis
- Knowledge of how to use a Virtual Machine (VM)
International Student Fee: 950 US$
Job Interview Preparation (Soft Skills Questions & Answers)
- Tough Open-Ended Job Interview Questions
- What to Wear for Best Job Interview Attire
- Job Interview Question- What are You Passionate About?
- How to Prepare for a Job Promotion Interview
Your FREE eLEARNING Courses (Click Here)
Internships, Freelance and Full-Time Work opportunities
- Join Internships and Referral Program (click for details)
- Work as Freelancer or Full-Time Employee (click for details)
Flexible Class Options
- Week End Classes For Professionals SAT | SUN
- Corporate Group Trainings Available
- Online Classes – Live Virtual Class (L.V.C), Online Training
Related Course
Defensible Security Architecture and Engineering: Implementing Zero Trust for the Hybrid Enterprise
Applied Data Science and AI/Machine Learning for Cybersecurity Professionals
Advanced Information Security Automation with Python