top of page

Advanced Tailored Course

We would like to thank you for the opportunity to develop a custom-made training program for your organisation. Below is a summary of all the content we can cover by module and the individual sessions the form that module; and the duration which provides both an estimate and flexibility to our course offerings.  A tailored course would usually run over 5 full days.

Module 

1: Open-Source Intelligence Fundamentals 

  • introduction to OSINT 

  • planning and direction 

  • collection, processing and exploitation 

  • analysis and production 

  • reporting and Integration 

 

2: OSINT Attribution & Tradecraft 

  • introduction to ICT 

  • technical attribution 

  • developing an OSINT platform 

3: Information Searching Essentials 

  • advanced google searching 

  • country specific resources 

  • username correlation 

  • reverse image searching 

  • contact validation 

  • people search engines 

4: Person of Interest Searching 

  • mainstream platforms

  • non-western platforms 

  • professional platforms 

  • gaming platforms

  • non-mainstream platforms

5: Social Network Analysis 

  • cross platform social network analysis

 

6: Australian OSINT 

  • Australian data sources 

7: Corporate Profiling 

  • company structures and networks 

  • technical artefacts 

  • domain enumeration and visualisation 

  • trade activity 

8: Area of Interest Monitoring & Events 

  • finding, investigating, and monitoring events  

  • collecting information from CCTV 

  • transport monitoring by land, air and sea 

  • alerts and triggers for events; and, 

  • geospatial tools (advanced mapping)

9. Area Assessment 

  • informational terrain (social and mainstream informational flow) 

  • human terrain (political actors and threat actors) 

  • health impacts; and,  

  • NGO activity 

10: The Deep Web 

  • Telegram 

  • WhatsApp 

  • Element.io 

11: The Dark Web 

  • introduction and attribution 

  • services, searching and monitoring 

  • network and client configuration 

 

12: Cryptocurrency 

  • cryptocurrency monitoring 

13: TTPs 

  • tactics, techniques, and procedures (TTP) Analysis 

  • TTP collection from Paste Sites 

14: Advanced OSINT Techniques 

  • data mining & OSINT at scale 

  • using AI for OSINT 

15: Persona Management 

  • Development of personas / profiles 

16: Applied Disinformation

  • disinformation primer 

  • actor intent & capability 

  • validating & verifying 

  • analysis of troll bot networks 

17: Image and Video Analysis using OSINT 

  • image and video meta-data 

  • image analysis techniques including image modification  

  • video analysis tools  

  • applying search engine techniques 

  • geolocation, geospatial referencing, time calculations 

18. Summative Assessment 

  • long form practical session aligned to thematic theme of tailored course

bottom of page