Axeten III (OSINT) Training Modules

Axeten III (OSINT) Training Modules

Online & Classroom courses and the Distance Learning Course all use the same 15 modules

Upgrades & Discounts

 

Module Description Duration in Hours:Mins  
No. Name Prep LOT Test Total Detail
1A Introduction to the training Introducing the process of the course, your trainer & Axeten. Module 1 is mandatory 2:00 2:00 0:30 4:30
1B Introducing Open Source Intelligence The Capabilities of III (OSINT) Investigations
1C Introducing the Investigation Process and Reporting Tasking, the Intelligence Cycle, Processing, Management and Reporting
2-U Legislation, Policies, Guidance and Ethics (Public Sector) Relevant to III (OSINT) in the UK & Europe and covering the extensive legislation and agency guidelines 2:00 2:00 0:20 4:20
2-R Legislation, Policies, Guidance and Ethics (Private Sector) Relevant to OSINT for private sector investigators in the UK & Europe. 1:00 1:10 0:20 2:30
3 Computer Set-up, Security with Footprints & Fingerprints Explains and demonstrates how a computer should be set-up and made safe for effective research and how its on-line footprint can be identified & altered 1:30 2:30 0:20 4:20
4 Creating and Managing Synthetic Identities Explains and demonstrates the set up and maintainance of an effective online synthetic identities for the safe processing of III (OSINT) investigations 2:00 2:00 0:20 4:20
5 The Internet, its Structure and Investigation Opportunities Explains how the Internet developed, its structure and the basic processes of investigating IP Addresses & Domain Names 1:10 1:30 0:20 3:00
6A Investigating Google with Advanced Search Techniques Explains and demonstrates how best to carry out online research using Google, the most popular search engine 1:40 2:00 0:40 4:20
6B Other Search Engines & Meta Search Engines Introduces a selection of other Search Engines and explains how to perform online research to locate other resources, intelligence and material to benefit the investigation
7A Introduction to Researching Social Media Platforms and Messaging apps Demonstrating the processes of identifying people through their social media and messaging activities 1:40 2:00 0:40 4:20
7B Investigating LinkedIn & Similar Platforms Demonstrates how to locate the wealth of information stored on the social media platform, LinkedIn and other similar platforms
8A Investigating Photo & Video Social Platforms Demonstrates how to locate the wealth of information available from popular photo & video related social media platforms such as Instagram, TikTok & YouTube 2:00 2:00 0:40 4:40
8B Investigating Twitter Demonstrates how to locate the wealth of information stored on the popular social media platform, Twitter and how to deploy other resources to find accurate and valuable information
9A Investigating Facebook Demonstrates how to locate the wealth of information stored on the popular social media platform, Facebook and how to use advanced techniques to find accurate and valuable information 2:00 2:00 0:40 4:40
9B Investigating Other Social Media Platforms Introduces several other popular social media platforms that may not have been encountered previously, including VK / OK
10 Investigating Online Databases Introduces and demonstrates how to research the many databases available to the III (OSINT) researcher 1:40 2:00 0:20 4:00
11A Investigating Blogs, Forums & Similar Platforms Demonstrates the wealth of information stored in blogs, forums & similar platforms and explains how to deploy techniques to identify people using them 2:00 2:00 0:40 4:40
11B Investigating Online Marketplaces Demonstrates and explains the search tools and techniques to identify people behind posts & accounts on internet marketplaces and auction platforms
12 Investigating Digital Images & Photographs Demonstrates and explains the techniques to research digital images 1:40 2:00 0:20 4:00
13 Emails as an Investigative Resource Introducing e-mail providers and messages as an investigative resource and the techniques to exploit the resources 1:40 2:00 0:20 4:00
14A Other Online Investigative Resources Introducing a selection of other resources that might be located online and how to investigate them 1:40 2:00 0:40 4:20
14B An Introduction to Accessing the Dark Web Introduces the Dark Web and demonstrates how to access the TOR network and locate valuable intelligence.
15A Open Source Intelligence Grading Introducing intelligence grading systems 1:20 2:00 0:20 3:40
15B An Introduction graphic reporting presentations Introducing graphic methods to report the intelligence and the relationships between identities and assets located during the investigation process