Close

Search for a Glomacs Course by Keywords


Schedules Introduction Objectives Training Methodology Organisational Impact Personal Impact Who Should Attend? Outline
Course Schedule
Date Venue Fees
29 Aug - 02 Sep 2022 London - UK $5,950
Course Description

Introduction

Open Source Intelligence training course is targeting to build the understanding on how to use data available by artificial intelligence techniques, methods, and tools. This is to acquire information from publicly available online sources to support data analysis.

Data can be used in different ways in criminal investigation such as predicting crimes, detecting terrorism activities & links parties, running background checks, and acquiring investigation about suspects and criminal activities.

This GLOMACS training course will show how to conduct investigations, gather personal data published on open accounts or blogs, use search engines to detect information about hashtags & public opinion, track suspects online using public databases and locate information buried in the web.

This GLOMACS training course will highlight:

  • The Evolution of Open Source Intelligence
  • Introduction to Online Threats and Countermeasures
  • The Dark Web & Open Source Intelligence
  • Search Engine Techniques
  • Social Media Intelligence
  • People Search Engines and Public Records
  • Open Source Intelligence & privacy

Objectives

At the end of this GLOMACS training course, you will learn to: 

  • Conceal digital identity and become anonymous online
  • Conduct advanced social media investigations 
  • Use search engines to return investigation results
  • Search historical deleted versions of websites
  • Investigate about suspects online using smart applications, social media accounts & websites and people 
  • Understand the dilemma of Open Source Intelligence & privacy (GDPR)

Training Methodology

This training course consists of five modules containing lectures, skills assessments, interactive discussions, video presentations and participant exercises to create a high impact-training environment.

The training course designed to be dynamic, highly interactive, and educational at the same time and the primary focus is to provide participants with concepts and methods that they can use in the workplace.

Organisational Impact

  • Developing the capabilities of workers in the field of understanding how to conduct investigations and collect information via the Internet using Open Source Intelligence
  • Developing the workers’ capabilities to collect information on security breaches in the organization by using Open Source Intelligence
  • Developing the capabilities of workers in analyzing the informational content of social media to predict security problems that may arise
  • Development of teaching and teaching capabilities in related fields

Personal Impact

  • Developing learners’ knowledge of the basics of using Open Source Intelligence in criminal investigations
  • Development of learners’ abilities to implement information gathering using Open Source Intelligence
  • Developing learners’ abilities to be able to implement strategies of Open Source Intelligence in cybercrimes investigation
  • Police officers working in the field of criminal investigation and information analysis
  • Public Prosecution members and judges
  • Information Security Officers
  • Lawyers
  • University faculty members
  • Security officials in institutions and companies

Who Should Attend?

  • Police officers working in the field of criminal investigation and information analysis
  • Public Prosecution members and judges
  • Information Security Officers
  • Lawyers
  • University faculty members
  • Security officials in institutions and companies
Course Outline

DAY 1

Defining the Open Source Intelligence 

  • Open Source Information Categories 
  • Open Source Intelligence Types
  • Parties Interested in Open Source Intelligence Information
  • Information Gathering Types
  • Benefits of Open Source Intelligence
  • Challenges of Open Source Intelligence

DAY 2

Online Threats and Countermeasures 

  • Online Threats
  • Security Software
  • Privacy Settings
  • Online Tracking Techniques
  • Digital Fingerprinting
  • Secure Online Communication

DAY 3

Open Source Intelligence & Privacy Dilemma 

  • Open source intelligence dilemmas
  • Data Collection
  • Personal data: Processing, sharing, mining and storage
  • Open source accountability

DAY 4

Search Engine Techniques 

  • Using Search Engines to Locate Information
  • Automated Search Tools
  • Internet of Things (IoT) Device Search Engines
  • News Search
  • Searching for Digital Files
  • Document & Digital images Search

DAY 5

Social Media Intelligence 

  • Definition of Social Media Intelligence
  • Investigating Social Media Sites
  • Tracking Photos Downloaded from Facebook to Its Source Profile
  • Twitter Advanced Search Operators
  • LinkedIn Search
  • Social Media Psychological Analysis
Certificates
  • On successful completion of this training course, GLOMACS Certificate with eligible Continuing Professional Education credits (CPE) from National Registry of CPE Sponsor, will be awarded to the delegates
  • Continuing Professional Education credits (CPE) : In accordance with the standards of the National Registry of CPE Sponsor, one CPE credit is granted per 50 minutes of attendance
Providers and Associations

Endorsed Education Provider

  • Quality Logo

In Association With

Oxford Management Centre

Oxford Management Centre

A GLOMACS - Oxford Management Centre collaboration aimed at providing the best training services and benefits to our valued clients.

Visit website

You may also be interested in...

Send to Colleague

© 2022. Material published by GLOMACS shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.


Sending your message. Please wait...

Send Successfully

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.

Print Page

© 2022. Material published by GLOMACS shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.


Sending your message. Please wait...

Close

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.

Download PDF

© 2022. Material published by GLOMACS shown here is copyrighted.

All rights reserved. Any unauthorized copying, distribution, use, dissemination, downloading, storing (in any medium), transmission, reproduction or reliance in whole or any part of this course outline is prohibited and will constitute an infringement of copyright.


Sending your message. Please wait...

Close

There was a problem sending your message. Please try again.

Please complete all the fields in the form before sending.

LinkedIn
Facebook
Twitter
WhatsApp
Email
Other