Axeten III (OSINT) Training Modules

Axeten III (OSINT) Training Modules

Online & Classroom courses and the Distance Learning Course all use the same 18 modules

Upgrades & Discounts

 

Module Description Duration in Hours:Mins  
No. Name Prep LOT Test Total Detail
1A

Introducing the training

An induction to the training, introducing the scope, process and assessment of the course with explanations of the legal obligations. This module is mandatory. 2:10 2:30 0:20 5:00
1B Open Source Intelligence Investigations Introducing the capabilities of internet intelligence and investigations.
1C The Investigation Process and Reporting Introduces and explains the Intelligence Cycle and the Tasking, Processing, Management, Grading and Reporting of an online investigation.
2-U Legislation, Policies, Guidance and Ethics (Public Authorities) Introduces the legislation, guidelines and ethics that relate to the activities of Public Authority III (OSINT) practitioners in the UK & Europe, with explanations of the processes for developing safe and effective policies and procedures. 2:15 2:30 0:15 5:00
2-R Legislation, Policies, Guidance and Ethics (Private Sector) Introduces the legislation, guidelines and ethics that relate to the activities of private sector OSINT practitioners in worldwide jurisdictions, with explanations of the processes for developing safe and effective policies and procedures. 1:00 1:30 0:15 2:45
3 Computer Set-up and Operational Security Explains and demonstrates how a computer should be set-up and made safe for effective investigation processing and how the on-line footprint and fingerprint can be identified and obfuscated for safe processing. 2:00 2:30 0:15 4:45
4 Creation, Management and Deployment of Synthetic Identities Introduces and explains the legal and ethical capacity of a Synthetic Identity (SI) and demonstrates, live and in real-time, the creation and management of an effective SI for safe online investigation purposes. 2:00 2:30 0:15 4:45
5A The Internet, its Structure and Investigation Opportunities Introduces the Internet and how it developed and explains its structure and the investigative opportunities with live real-time demonstrations of the processes to investigate IP Addresses & Domain Names. 2:00 2:30 0:30 5:00
5B Websites, The Internet of Things & Other Resources Explains and demonstrates, live and in real-time, the processes to investigate entities connected to websites, the Internet of Things and other networked and stand-alone technical resources.
6A POLE & the Process of an III (OSINT) Investigation An explanation of the POLE structure of an investigation, with it’s inherent 'data standards', followed by an introduction to eForensics with explanations and live demonstrations of the eForensic process that shall be further demonstrated in subsequent modules, so that the practitioner will acquire the capability to process an investigation for safe and effective prosecution (litigation). 2:00 2:30 0:30 5:00
6B Investigating People & Vanity Names Introduces, explains and demonstrates, live in real-time, the processes to locate and investigate people and their Vanity Names.
7A Internet Search Processes & Types of Search Engine

Introduces a selection of Search Engines and different types of Search Engine, explains and demonstrates, live and in real-time, the various search queries and techniques that can be deployed to optimise the results.

2:00 2:30 0:30 5:00
7B Comparing Search Engines Advanced Search capabilities explained and demonstrated, live and in real-time, with Google as the primary example.
8A Digital Files & Images Introduces the many different types of digital files, including still and moving images; then explains and demonstrates, live and in real-time, the techniques to locate and extract data and other intelligence from the material. 2:00 2:30 0:30 5:00
8B Maps & Geolocation Introduces, explains and demonstrates, live and in real-time, the techniques to investigate online mapping solutions.
9A Communication Resources: Email & VOIP Introducing e-mail & telephony resources with explanations and live, real-time demonstrations of the techniques required to exploit these resources. 2:00 2:30 0:30 5:00
9B Communication Resources: Messaging Apps & Other Resources Introducing messaging apps as an investigative resource, with explanations and demonstrations, live and in real-time, of the techniques required to process the resource, including emulator deployment.
10A Introduction to Social Media Platforms Introducing the capabilities of Social Media as an investigative resource and the processes of identifying people through their social media accounts and activities. 2:00 2:30 0:30 5:00
10B LinkedIn & Similar Platforms Explains and demonstrates, live and in real-time, how to locate and capture intelligence and material available on the social media platform, LinkedIn, and other similar platforms.
10C Twitter Explains and demonstrates, live and in real-time, how to locate and capture intelligence and material available on the micro-blogging platform, Twitter and other similar platforms.
11 Photo & Video Platforms Explains and demonstrates, live and in real-time, how to locate and capture intelligence and material available on many popular photo & video sharing platforms such as TikTok, Instagram, SnapChat & YouTube. 2:00 2:30 0:30 5:00
12A Facebook Explains and demonstrates, live and in real-time, how to locate and capture intelligence and material that is available on Facebook; including advanced search techniques. 2:00 2:00 0:40 5:00
12B Other Social Media Platforms Introduces and demonstrates, live and in real-time, the investigative processes deployed on several other social media platforms that may be new to the practitioner. There is an emphasis on accessing and investigating foreign language platforms.
13 The Deep Web: Online Databases Introduces online databases that can be accessed by the practitioner with explanations and live real-time demonstrations of processing techniques. 2:00 2:30 0:15 4:45
14A Blogs, Forums & Similar Platforms Introduces blogs, forums & similar platforms, then explains and demonstrates, live and in real-time, how to deploy III (OSINT) techniques to identify people using these resources. 2:00 2:30 0:30 5:00
14B Online Marketplaces Introducing internet marketplaces and the activity of users, with explanations and live real-time demonstrations of the resources and techniques to identify people.
15A Blockchain & Cryptocurrencies Introduces the Blockchain & Cryptocurrencies and explains with live real-time demonstrations of the investigative capabilities of these online resources. 2:00 2:30 0:30 5:00
15B The Dark Web & the TOR Network Introducing the Dark Web with explanations and a demonstration, live and in real-time, of how to access the TOR network to locate intelligence & material.
16 Data Breaches Introduces Data Breaches, then explains and provides live real-time demonstrations of the processes to locate and capture intelligence. 2:00 2:30 0:15 4:45
17A Command Line Investigations: Bash Introduces the Command Line, and explains and demonstrates, live and in real-time, the Bash requests to locate and gather intelligence. 2:00 2:30 0:30 5:00
17B Command Line Investigations: Python

Explains with live real-time demonstrations various Python requests to locate and gather intelligence.

18 Advanced investigative applications Introduces and demonstrates, live and in real-time, the investigative capabilities of Maltego, Skopenow, Censys and Shodan. 2:00 2:30 0:30 5:00