Day 5 of each course is reserved for a Q&A session, which may occur off-site. For 10-day courses, this also applies to day 10
Available Dates | City | Fees | Actions |
---|
Within any industry, it is vital to gather and structure data effectively. Data can provide great insight into any desired area and grant the ability to further develop an overall organisation, certain functions, or specific projects. Without a surplus source of data, the organisation can be disconnected from the outside world, causing it to fall behind competitors or to be incapable of meeting goals and objectives.
To be competent at open-source intelligence, it is necessary to understand the different types of open-source data and how to access these efficiently. Once accessed, those involved would need a keen eye for detail to understand what information can be utilised and what is irrelevant to the cause. Various methods can yield more accurate data collection results, and multiple techniques can aid in categorising and processing the data.
Furthermore, when collecting data through open-source intelligence, there must be a strong focus on security. Data collection should ideally be done anonymously to protect the individual and their organisation. Sensitive data should be securely stored and managed to ensure no potential damaging content is leaked.
Upon completion of this course, participants will be able to:
This course is designed for anyone within an organisation responsible for sourcing information and wishing to develop their knowledge of open-source intelligence. It would be most beneficial for:
This course uses a variety of adult learning styles to aid full understanding and comprehension. Participants will be provided case studies of open-source intelligence objectives that they will work to complete throughout the course, utilising their knowledge and new skills.
They will participate in a variety of learning exercises to ensure full comprehension and development of the related skills and knowledge. The course will combine seminars, video materials, group discussions, and practical activities. These, alongside the case studies, will allow the participants to apply their abilities practically and receive feedback from the tutors and other participants.
Section 1: Fundamentals of Open-Source Intelligence
Section 2: Online Threats and Countermeasures
Section 3: Open-source Intelligence Privacy Dilemma
Section 4: Search Engine Techniques
Section 5: Social Media Intelligence
Upon successful completion of this training course, delegates will be awarded a Holistique Training Certificate of Completion. For those who attend and complete the online training course, a Holistique Training e-Certificate will be provided.
Holistique Training Certificates are accredited by the British Assessment Council (BAC) and The CPD Certification Service (CPD), and are certified under ISO 9001, ISO 21001, and ISO 29993 standards.
CPD credits for this course are granted by our Certificates and will be reflected on the Holistique Training Certificate of Completion. In accordance with the standards of The CPD Certification Service, one CPD credit is awarded per hour of course attendance. A maximum of 50 CPD credits can be claimed for any single course we currently offer.