Eighteen modules of OSINT training that covers the extensive resources and techniques available to the OSINT practitioner.
A Blended Online OSINT Training (BOOT) designed for aspiring team leaders and senior investigators in any country with responsibility for the processing of online investigations.
The Advanced course introduces, explains and demonstrates, live and online, the many other resources that make up the complete attack surface available to the OSINT practitioner. The Foundation component teaches the structure and legality of the process and explains how to stay safe while being effective. The Essential Tools and Resources component focuses on the importance of verifying the identity of a subject. Every OSINT practitioner should have this knowledge and the relevant skill sets to process investigations safely.
The investigative techniques taught include advanced searching of Google and other search engines, the special techniques required to locate and effectively research the multitude of social media platforms and hundreds of online databases, websites, images, e-mails and other messaging applications and other online resources such as marketplaces, blogs, forums, archives, gaming and gambling platforms, and technical assets that include but are not limited to domains, networks and the Dark Web, Data breach and leaks, Command Line investigations and advanced applications for OSINT.
The trainee will acquire the capability to safely deploy an investigation, in compliance with the legislation and how to locate and connect people and organisations through their online activity, even where an entity might have no intended on-line presence. The trainee will have the capability to safely gather intelligence and material, grade the evidence and compose a report with graphic presentations all of the attributes required for safe and effective litigation to the standard required for a Public Prosecution.
An induction to the training, introducing the scope, process and assessment of the course with explanations of the legal obligations.
Introducing the capabilities of internet intelligence and investigations.
Introduces and explains the principles of gathering open source intelligence with an overview of the processes deployed to gather and preserve intelligence.
Introduces the legislation, guidelines and ethics that relate to the activities of private sector OSINT practitioners in worldwide jurisdictions, with explanations of the processes for developing safe and effective policies and procedures.
Explains and demonstrates how a computer should be set-up and made safe for effective investigation processing and how the on-line footprint and fingerprint can be identified and obfuscated for safe processing.
Introduces and explains the ethical & responsible capacity of a Synthetic Identity (SI) and demonstrates, live on-line the creation and management of an effective SI by a private sector practitioner.
An explanation of the POLE structure of an investigation, with it’s inherent data standards and a live demonstration of real-time deployment of POLE items during an investigation process.
Explains and demonstrates the safe investigation processes of decision making, contemporaneous note taking, sensitive processing, eForensic security and preparation for eDisclosure. These processes shall be demonstrated time and again during subsequent Live Online Training events, so that the practitioner will acquire the capability to process an investigation for safe and effective prosecution (litigation).
Introduces, explains and demonstrates the Intelligence Grading process and Report composition with graphic presentations for an online investigation.
Introduces the Internet and how it developed and explains its structure and the investigative opportunities with live on-line demonstrations of the processes to investigate IP Addresses & Domain Names.
Explains and demonstrates, live and on-line, the processes to investigate entities connected to websites, the Internet of Things and other networked and stand-alone technical resources.
Introduces, explains and demonstrates, live on-line, the processes to locate and investigate people and their Vanity Names.
Introduces a selection of Search Engines and different types of Search Engine, explains and demonstrates, live on-line, the various search queries and techniques that can be deployed to optimise the results.
Advanced Search capabilities explained and demonstrated, live and on-line, with Google as the primary example.
Introduces the many different types of digital files, including still and moving images; then explains and demonstrates, live and on-line, the techniques to locate and extract data and other intelligence from the material.
Introduces, explains and demonstrates, live and on-line, the techniques to investigate online mapping solutions.
Introducing e-mail & telephony resources with explanations and live, on-line demonstrations of the techniques required to exploit these resources.
Introducing messaging apps as an investigative resource, with explanations and live on-line demonstrations of the techniques required to exploit the resource, including emulators.
Introducing the capabilities of Social Media as an investigative resource, with explanations of the processes to identify people through their social media accounts and activities.
Explains and demonstrates how to locate and capture intelligence and material available on the social media platform LinkedIn and other similar platforms.
Explains and demonstrates, live and on-line, how to locate and capture intelligence and material available on the micro-blogging platform Twitter and other similar platforms.
Explains and demonstrates, live and on-line, how to locate and capture intelligence and material available on many popular photo & video sharing platforms such as TikTok, Instagram, SnapChat & YouTube.
Explains and demonstrates, live and on-line, how to locate and capture intelligence and material that is available on Facebook; including advanced Facebook search techniques.
Introduces, explains and demonstrates, live and on-line, the investigative techniques deployed on several other social media platforms that may be new to the practitioner. There is an emphasis on accessing and investigating foreign language platforms.
Introduces blogs, forums & similar platforms, then explains and demonstrates, live and on-line, how to deploy OSINT techniques to identify people using these resources.
Introducing internet marketplaces and the activity of users, with explanations and live on-line demonstrations of the resources and techniques to identify people and their activities.
Introduces the Blockchain & Cryptocurrencies and explains, with live on-line demonstrations, the investigative capabilities of these online resources.
Introducing the Dark Web with explanations and a live on-line and demonstration of how to access the TOR network to locate intelligence & material.
Introduces Data Breaches, then explains and provides live on-line demonstrations of the processes to locate and capture intelligence.
Introduces the Command Line, and explains and demonstrates, live and on-line, how to locate and gather intelligence.
Introduces and demonstrates, live and on-line, the investigative capabilities of Maltego, Skopenow, Censys and Shodan.
If you need to raise an Purchase Order, Contact us
If you are in the UK, you can make a payment in GBP with VAT included. PAY HERE
If you are in the EU (EEA) :-
- and registered for VAT/TVA, you can pay in Euros with the RCM applied. PAY HERE
- but not registered for VAT/TVA, you can make a payment in Euros. PAY HERE
If you are not in the EU (EEA) or the UK, VAT is not charged. To request a payment URL, Contact us
This Blended Advanced Open Source Intelligence training has 18 modules.
If you do not want to take all 18 modules, one of our short courses might work for you.
If that doesn't work, and you have up to 12 trainees, consider a customized online private training or a customised classroom private training,
If that doesn't work, contact Axeten, tell us what you want, and we'll do our best to deliver.
A BOOT is open to anyone anywhere with a online investigation remit within any jurisdiction.
The online training, is a blend of portable document files (PDF) containing OSINT training material.
The PDF for a module is module delivered to each trainee by e-mail one week before the Live Online Training (LOT) commences.
For each module, the trainee should allow for 1 to 2 hours of study time, to read the material and perform the exercises, preferably before the Classroom Training for that module.
The time for this activity is included in the CPD. So that of the 87 CPD hours for this course, 40 hours is study time, 43 hours is live training and 4 hours is tests & exam.
The reality is that many delegates read the PDFs in preparation for a Final Exam. That is prudent as the subject matter of many exam questions is covered in the PDFs.
However, to get the most out of the classroom training, where tools, techniques and resources are all demonstrated live and online, it is best to read the PDFs before the live training.
Live Online Training (LOT) events are delivered on Tuesdays.
The subsequent LOTs take place on the same day of the week, at the same time.
The typical duration of a LOT is 160 minutes, though the duration can range from 120 to 180 minutes for some modules
Each Live Online Training will commence with a Q&A session; so delegates can ask any questions concerning the current module.
After that, the trainer will cover the salient points of the module in some detail.
Processing modules are packed with real-time live demonstrations.
The trainer might set a short quiz to see how you are doing.
The intention is that, by the end of each Live Online Training, every delegate shall have the capability to conduct the OSINT processes relevant to the current module.
With BraveTalk, we provide one URL to connect and the same URL works for all modules on the course.
It is not necessary to download and install the Brave browser. You can connect with any browser, though Brave is a Chromium Browser and so BraveTalk does work better on another Chromium browser.
Learn all about browsers in module 3.
Zoom is not not privacy conscious. Even though Axeten has a premium account, Zoom will try to collect data about people connecting to the LOT.
So why do we use it? Because its popular and people rely on it.
Each LOT can be accessed from your office, from the delegate's home or even from a mobile device.
However, to fully participate and to process any tasks set by the trainer, during the Live Online Training, it's always more productive to use a desktop computer with two displays.
With one display, you can observe the training and on the other display, you can process any tasks set by the trainer.
At the end of each Live Online Training, any client might request that each of their delegates should take a weekly test for a blended course.
The tests are not mandatory, but it is recommended that all delegates take the tests.
The weekly tests allow each trainee to assess their progress and to become familiar with the process, which is the same in the Final Exam.
At the end of the Training, there is an option for each trainee to take final exam and receive a certificate
The final exam is online. Time can be taken to study the printed material before taking the exam.
Each delegate can select their exam date, up to 30 days after the end of the training.
The exam has about 60 multiple choice questions.
Time allowed: 120 minutes.
The candidate will require access to the internet to process live investigations.
Where the 70% pass mark is achieved, CPD credits are awarded.
Otherwise, and only of you attended the LOT, a Certificate of Attendance is issued with no CPD credits.
Each Live Online Training is recorded.
Delegates that are not able to attend a Live Online Training can request access to the recording.
There is no additional fee for the recording service.
TRAINING MATERIAL MAINTENANCE
Twice a year, Axeten conducts a complete review of all of the training material.
Any significant update located during any review is applied to the training material.
All review and update activity is recorded and signed off by a director.
LIFE LONG LEARNING
The best and most cost effective way for you to stay up-to-date is to subscribe to the Life Long Learning programme.
ONLINE REFRESHER COURSE - 6 MODULES
If you don't subscribe to the LLL programme and you are an occasional OSINT user,
consider taking the OSINT Refresher course. Do this every other year to preserve your capability.
The OSINT Refresher Course is available online or in a classroom environment.
OSINT UPDATES COURSE - 4 MODULES
The monthly Axeten OSINT Newsletter provides info about new tools, techniques and resources.
The best of these are built into the next OSINT Updates course.
Subscribe to the OSINT Newsletter.
NEW COURSE INFO
Bookmark this page and check for new course dates or subscribe to the Axeten Training Newsletter.
There are two types of deferral.
1. An organisation may purchase multiple seats in one purchase order, but defer the use of those seats until a later course.
2. A practitioner that starts a course, may for any reason, suspend their participation in the course and defer to a later course.
On the later course, the practitioner can pick-up from where they left off, or start the whole course again.
Scope: A comprehensive and extensive training course, covering all matters relating to OSINT.
Audience: A Training for Corporate & Third sector researchers, Human Capital and Legal Services professionals, and Private investigators.
Jurisdiction: This course is not UK or EU centric, with the exception of Module 2, Legislation & Policies, where the relevant legislation is predominantly UK & EU.
Sector Differentiation: The difference between training for the 1st Sector and the 2nd & 3rd Sectors explained in detail.
Format: One module each week. Starting with the PDFs and ending with the interactive Live Online training.
Duration: 19 weeks.
Requirements: No specialist equipment is required, just a standard desktop or laptop computer with a good Internet connection and a Firefox Browser. A webcam & a microphone is optional.
Data Protection: Each organisation and all its trainees, that take the training are responsible for protecting the data that might be processed during the training. Do not leak data to corporate interests. To do this, avoid the use of the Chrome or Edge Browsers.
Copyright: Each recipient of the training is obliged to protect the course material. There is no right to distribute the material to anyone else. This includes people inside your organisation.
Security: Each recipient of the training, and any purchasing organisation, is obliged to ensure that all computers and devices used during the course, are not compromised, so the material is not distributed unintentionally.
Accreditation: All courses are accredited by The CPD Group. Modules in this course are accredited individually.
Sign-up: Please contact Axeten to sign-up for the training or to request more information.
Open to anyone with an OSINT remit
Wednesday 6 September 2023
Wednesday 13 September 2023
Wednesday 31 January 2024
18 Modules over 21 weeks
Modules 2-U & 4-U are delivered separately