Using Open Source Intelligence to Structure Effective Data Gathering


Course Info

Code IND02-115

Duration 5 Days

Format Classroom

Using Open Source Intelligence to Structure Effective Data Gathering

Course Summary

 

Within any industry, it is vital to gather and structure data effectively. Data can provide a great insight to any desired area and grant the ability to further develop an overall organisation, certain functions, or specific projects. Without a surplus source of data, the organisation can be disconnected from the outside world causing them to fall behind competitors or to be incapable of meeting goals and objectives.


 

 

To be competent at open-source intelligence, it is necessary to understand the different types of open-source data and how to efficiently access these. Once accessed, those involved would need a keen eye for detail to understand what information can be utilised and what is irrelevant to the cause. There are various methods that can yield more accurate data collection results, and multiple techniques to aid in categorising and processing the data.


 

 

Furthermore, when collecting data through open-source intelligence, there must be a strong focus on security. Data collection should ideally be done anonymously to protect the individual and their organisation. Sensitive data should be securely stored and managed to ensure no potential damaging content is leaked.


 


 

During this course, you’ll learn:


 

To understand the vitality of open-source intelligence for effective data gathering.
To review the evolution of open-source intelligence and how it adapted to what is used today.
To explain the dilemma of open-source intelligence and privacy (GDPR).
To assess the concepts, principles, and typical uses of open-course intelligence.
To utilise a variety of search engine techniques and tools to return investigation results.
To conduct investigations of suspects online using smart applications, social media accounts and existing and deleted websites.
To effectively conceal digital identity to carry out open-source intelligence methods anonymously.

 

This course is designed for anyone within an organisation who is responsible for sourcing information and wishes to develop their knowledge on open-source intelligence. It would be most beneficial for:


 

Data Analysts
Prosecution Personnel
Information Security Officers
Security Managers
Solicitors and Legal Representatives
Detectives
Open-source Intelligence Strategist`

 

This course uses a variety of adult learning styles to aid full understanding and comprehension. Participants will be provided case studies of open-source intelligence objectives that they will work to complete throughout the course, utilising their knowledge and new skills.


 

 

They will partake in a variety of learning exercises to ensure full comprehension and development of the related skills and knowledge. There will be a combination of seminars, video materials, group discussions and practical activities. These, alongside the case studies, will allow the participants to apply their abilities in a practical sense and receive feedback from the tutors and other participants.


 


Course Content & Outline

 

Section 1

 

Fundamentals of Open-Source Intelligence
Defining what open-source intelligence is.
Assessing the various sources of intelligence – news and media, grey literature, social media, and dark web.
The advantages and disadvantages of using each source of intelligence.
Explaining the benefits and limitations of using open-source intelligence.
Identifying what parties are interested in open-source information.


 

 

Section 2

 

Online Threats and Countermeasures
Exploring the possible online threats and predicting their probability.
Prioritising threats and establishing preventative measures.
Different types of security software and their ideal purpose.
Managing digital privacy settings when conducting open-source intelligence investigations.
The importance of securing online communication.
Online tracking techniques and how to protect yourself.


 

 

Section 3

 

Open-source Intelligence Privacy Dilemma
Comprehending the open-source intelligence privacy dilemma.
The ethical implications of collecting private data, leaked content, and sensitive information.
Securing collected data safely throughout the sourcing and analysis process.
The process of managing personal data – acquiring, processing, sharing, mining and storage.
Open-source accountability.


 

 

Section 4

 

Search Engine Techniques
Utilising various search engines to locate specific information.
Identifying which search engine would yield ideal results.
Implementing automated search tools to improve productivity and manage security.
Integrating Internet of Things (IoT) device search engines into standard use.
Searching for digital files, images, and documents.


 

 

Section 5

 

Social Media Intelligence
Defining social media intelligence.
How social media has evolved the standard of open-source intelligence.
Efficiently searching social media websites and applications for the desired information.
Tracking photos downloaded from social media pages to its source location.
Taking advantage of advanced search operators for Twitter, Facebook and Instagram.
Conducting social media psychological analysis.


8 Best Practices to Elevate Your Company's Data Management Strategy
Enhance your business with robust data management. Learn its importance, synergy with AI, and 8 best practices for optimised decision-making, security, and innovation.



Course Video