Classroom Sessions:
Date | Venue | Fees | |
---|---|---|---|
01 - 05 Sep 2025 | Dubai - UAE | $5,950 | |
08 - 12 Dec 2025 | London - UK | $5,950 |
INTRODUCTION
Open Source Intelligence training course is targeting to build the understanding on how to use data available by artificial intelligence techniques, methods, and tools. This is to acquire information from publicly available online sources to support data analysis.
Data can be used in different ways in criminal investigation such as predicting crimes, detecting terrorism activities & links parties, running background checks, and acquiring investigation about suspects and criminal activities.
This GLOMACS training course will show how to conduct investigations, gather personal data published on open accounts or blogs, use search engines to detect information about hashtags & public opinion, track suspects online using public databases and locate information buried in the web.
This GLOMACS training course will highlight:
- The Evolution of Open Source Intelligence
- Introduction to Online Threats and Countermeasures
- The Dark Web & Open Source Intelligence
- Search Engine Techniques
- Social Media Intelligence
- People Search Engines and Public Records
- Open Source Intelligence & privacy
Objectives
At the end of this GLOMACS training course, you will learn to:
- Conceal digital identity and become anonymous online
- Conduct advanced social media investigations
- Use search engines to return investigation results
- Search historical deleted versions of websites
- Investigate about suspects online using smart applications, social media accounts & websites and people
- Understand the dilemma of Open Source Intelligence & privacy (GDPR)
Training Methodology
This training course consists of five modules containing lectures, skills assessments, interactive discussions, video presentations and participant exercises to create a high impact-training environment.
The training course designed to be dynamic, highly interactive, and educational at the same time and the primary focus is to provide participants with concepts and methods that they can use in the workplace.
Organisational Impact
- Developing the capabilities of workers in the field of understanding how to conduct investigations and collect information via the Internet using Open Source Intelligence
- Developing the workers’ capabilities to collect information on security breaches in the organization by using Open Source Intelligence
- Developing the capabilities of workers in analyzing the informational content of social media to predict security problems that may arise
- Development of teaching and teaching capabilities in related fields
Personal Impact
- Developing learners’ knowledge of the basics of using Open Source Intelligence in criminal investigations
- Development of learners’ abilities to implement information gathering using Open Source Intelligence
- Developing learners’ abilities to be able to implement strategies of Open Source Intelligence in cybercrimes investigation
- Police officers working in the field of criminal investigation and information analysis
- Public Prosecution members and judges
- Information Security Officers
- Lawyers
- University faculty members
- Security officials in institutions and companies
WHO SHOULD ATTEND?
- Police officers working in the field of criminal investigation and information analysis
- Public Prosecution members and judges
- Information Security Officers
- Lawyers
- University faculty members
- Security officials in institutions and companies
DAY 1
Defining the Open Source Intelligence
- Open Source Information Categories
- Open Source Intelligence Types
- Parties Interested in Open Source Intelligence Information
- Information Gathering Types
- Benefits of Open Source Intelligence
- Challenges of Open Source Intelligence
DAY 2
Online Threats and Countermeasures
- Online Threats
- Security Software
- Privacy Settings
- Online Tracking Techniques
- Digital Fingerprinting
- Secure Online Communication
DAY 3
Open Source Intelligence & Privacy Dilemma
- Open source intelligence dilemmas
- Data Collection
- Personal data: Processing, sharing, mining and storage
- Open source accountability
DAY 4
Search Engine Techniques
- Using Search Engines to Locate Information
- Automated Search Tools
- Internet of Things (IoT) Device Search Engines
- News Search
- Searching for Digital Files
- Document & Digital images Search
DAY 5
Social Media Intelligence
- Definition of Social Media Intelligence
- Investigating Social Media Sites
- Tracking Photos Downloaded from Facebook to Its Source Profile
- Twitter Advanced Search Operators
- LinkedIn Search
- Social Media Psychological Analysis
- On successful completion of this training course, GLOMACS Certificate will be awarded to the delegates
- Continuing Professional Education credits (CPE) : In accordance with the standards of the National Registry of CPE Sponsor, one CPE credit is granted per 50 minutes of attendance
Endorsed Education Provider
GLOMACS is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.NASBARegistry.org
In Association With
Oxford Management Centre
A GLOMACS - Oxford Management Centre collaboration aimed at providing the best training services and benefits to our valued clients.
GLOMACS Training & Consultancy
Typically replies within an hour