top of page
4day-2.png

OSINT CYBER INVESTIGATOR COURSE OVER 4 DAYS  ONLINE

​

Due to the sensitive nature of some of the content, this course is restricted to MIL/GOV/LEA only. Please note that you will only be able to register with an official email address. Online based emails ( gmail, proton mail etc) will not be accepted. Please do not register and pay using an online email. The refund will incur a $25 admin fee charged by the bank. 

THIS INVESTIGATOR COURSE, HELD OVER 4 DAYS, DEALS WITH THE MOST UP TO DATE AND CUTTING EDGE TOOLS, AND METHODOLOGY AVAILABLE TODAY. IT IS DESIGNED FOR THE MODERN DAY INVESTIGATOR, DIGITAL MEDIA SPECIALIST AND ANALYST INVOLVED IN ONLINE INVESTIGATIONS AND COMPLEX CASES. 

​

The workshop and masterclass, covers the very best up to date methods and tradecraft to equip the modern day cyber investigator with all the latest cutting edge tools and proactive investigation methodology. The content of this unique course not offered anywhere else. The course material is supported by real world examples and incidents. This is not a general lecture course. This course will provide the student with the understanding of how to accomplish effective investigation of OSINT and Darknet investigations. The course will allow Law enforcement to step up their investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet..This is an advanced level course presented from an investigators point of view. Those with a non-technical background will also benefit from the material presented. The course is strictly restricted to Government and police as it contains new and innovative methodology and techniques.

​

Key areas covered

 

    • Online profile interrogation and building.

    • Social network data harvesting.

    • Device tracking

    • Searching for data in the deep web

    • OSINT tool use and practicals

    • SOCMINT and HUMINT Analysis 

    • Live tracking and monitoring

    • Best practice in intelligence and evidence gathering

    • Search techniques and awareness.

    • Pro active and innovative techniques

    • Understanding social engineering and using it against targets.

​

IT WILL DEAL WITH DATA SCRAPING AND ADVANCED ONLINE COVERT SURVEILLANCE OF SOCIAL NETWORK USERS. DATA MINING AND EXPLOITATION. CUTTING EDGE OSINT DATABASES AND TOOLS. SPECIFICALLY IN RELATION TO MANHUNTS, PEDOPHILE PROFILING, CRIMINAL GAND ACTIVITY, IDENTIFICATION AND DISRUPTION.   DIGITAL PROFILING FROM MULTIPLE SOURCES. INJECTION AND COUNTER CRYPTOLOGY METHODS. I2 ANALYTICAL DATA RECORDING. MONEY LAUNDERING AND ONLINE CAROUSELING awareness

​

THE COURSE INCLUDES CERTIFICATES TO ENHANCE CAREER DEVELOPMENT

​

Those who sign up for the 4 day course will receive an additional 1200 OSINT and SOCMINT tools list

COMPLETELY FLEXIBLE COURSE OPTIONS- BOOK SINGLE DAYS AT 1 DAY COST, OR BOOK THE ENTIRE COURSE AT A DISCOUNT. STUDENTS WHO HAVE ENROLLED AND PAID FOR PREVIOUS 1 DAY SOCMINT RECEIVE A FURTHER DISCOUNT AS SOME OVERLAP OCCURS.

​

Price per day : $150

Price for entire 4 day access : $520

Price for registered delegates on the 1 day SOCMINT course : $450

DAY 1  - Digital hygiene and tradecraft, best practice, understanding and tricking the networks. 

Monday 12TH  OCT

09:00 EST

Tradecraft Covert (non attribution) and non-identifying search methods.

Deep searching and analysis. Alternative tool and site searching. footprint reduction and incognito browsing. Non identifying profile creation using virtual mobiles and emails to allow registration. OSINT legend building. Tricking the social networking sites into giving us access to data. viewing and monitoring of closed accounts. 

​

Deep searching of links and connections into a website; common or accessed sites sharing the same server space. Identifying IP and owners of sites and upload location. Possible server vulnerabilities and exploits.

Alternative sources of data sets relating to subjects. ±How and where we can find social network data without approaching the site directly.

Network infrastructure and identifying flaws. 

​

Considerations regarding Intercept , Privacy and AP. Also cover the transition to evidence from intel online, Business data without applying for it, and identifying company interests and ownership which were not available or known. Impact of GDPR and DPA.

 

​

BOOK ALL 4

DAY 2. - Deep open sourcing. covert , safe and secure searching. Best tools practice and use. 

Tuesday 13TH OCT

09:00 EST

Open source investigation is not a simple task anymore.  This module will enable the delegate to stay ahead of the curve, and is intended for the internet cybercrime investigator and researcher, in order to take them from the basic researcher who understands the basics of internet investigation, to advanced open source researcher, able and proficient in providing high quality reports and evidence relating to online investigations and intelligence.

Analysing and understanding data sets and integrating them in other software such as I2

​

Topics include clever searching, best tools use ( over 300), Boolean equations, automated multi search tools, auto monitoring , historic and deleted data . Walkthrough and live exercises in finding and harvesting deep embedded open source data. Auto scrapers, Understanding the target. Multi lingual searches. Understanding and using social engineering against servers and targets to obtain best results. OSINT and SOCMINT correlation and best tools

​

Identifying which sites are used by the target quickly, then interrogation of the sites by searching the data not by using the site. Links between targets on the same and different SN sites. Direct and historic chats between multiple profiles to prove association and analysis.

​

Book whole course

DAY 3 - Image tracking, tracing image sources . Digitally profiling targets and geolocation through SN

Wednesday 14th OCT

09:00 EST

Images, Exif and meta tabs

Tracking duplicates, sources uploading, meta data and exif data interrogation and identifiers to establish device, location, source and tracking. Hashing and searching for sharing and uploading Significant images. Providing sufficient data and intel to support dissemination to active teams and support warrants .

Identifying which SN sites are used by the target quickly , then interrogation of the sites by searching the data not by using the site. Links between targets on the same and different SN sites. Direct and historic chats between multiple profiles to prove association and analysis. Analysis online of a subjects location when uploading / tweeting/ blogging AND the identity and location of the people in their online group. API harvesting 

Tracing historic and deleted data and images. 

Identifying targets by their device movement and location. Identifying public wifi spots used and interrogation. Tracking and identifying devices on the internet and their speed direction and use by the target.

Includes vehicle telematics, association, speed, data sources and non-visual surveillance. Identifying buildings/ locations (public and private) that the device uses and frequents.

Identifying target human behaviour through online posts, and using that to identify commute routes, workplace, home location and associates

Book whole course

DAY 4  - Dark web, crypto tracking, money laundering. Maltego as an investigation tool

Thursday 

15th  OCT

09:00 EST

Do you do investigations involving bitcoin? Need to understand how to track the funds through various Cryptocurrencies? How do wallets work and is there any evidence I can use when I find one? This session will provide you with the ability to understand and deal with Bitcoin and other cryptocurrencies during you investigations. Identifying and locating transactions. Disrupting channels and transactions

 

Darkweb investigations

Understanding the environment of Tor. Methods to track and identify users on Tor. Public key exploitation to identify users.

​

Identifying organised criminal activity online and disrupting/ infiltrating.

​

Identifying paedophile use of the system and chasing the user down.

​

Maltego training for best use as an investigation tool

​

​

Book whole course
bottom of page