The Advanced Open Source Intelligence Blended Online Training is a comprehensive course for Law Enforcement Internet Investigations & Intelligence (III) practitioners.
This Blended Online OSINT Training (BOOT) is an 'open' course. However, only employees of a public authority may participate.
Eighteen modules covering everything a Public Authority employee needs to know about III (OSINT) investigations.
The Advanced course covers Everything OSINT. the policies, guidelines and the relevant legislation. For officers in the UK this concern powers available under the IPA 2016 legislation. For officers in Europe and Worldwide this relates to MLAs, and privacy legislation to prepare for the acquisition of personal information for organisations.
The training is a blend of printed material, and multiple live and interactive training modules, delivered online or in a classroom.
The 'Open' online course is provided once each year and can be attended by a single person or by group of people from a Public Authority.
'Private' online courses are available on demand.
The Advanced course for Law Enforcement Officers introduces, explains and demonstrates, live and online, the many other resources that make up the complete attack surface available to the OSINT practitioner. The Foundation component teaches the structure and legality of the process and explains how to stay safe while being effective. The Essential Tools and Resources component focuses on the importance of verifying the identity of a subject. Every OSINT practitioner should have this knowledge and the relevant skill sets to process investigations safely.
The investigative techniques taught include advanced searching of Google and other search engines, the special techniques required to locate and effectively research the multitude of social media platforms and hundreds of online databases, websites, images, e-mails and other messaging applications and other online resources such as marketplaces, blogs, forums, archives, gaming and gambling platforms, and technical assets that include but are not limited to domains, networks and the Dark Web, Data breach and leaks, Command Line investigations and advanced applications for OSINT.
The Law Enforcement practitioner will acquire the capability to safely deploy an investigation, in compliance with the legislation and how to locate and connect people and organisations through their online activity, even where an entity might have no intended on-line presence. The trainee will have the capability to safely gather intelligence and material, grade the evidence and compose a report with all of the attributes required for safe and effective prosecution and where required, with graphic presentations of the evidence.
An induction to the training, introducing the scope, process and assessment of the course with explanations of the legal obligations.
Introducing the capabilities of internet intelligence and investigations.
Introduces and explains the principles of gathering open source intelligence with an overview of the processes deployed to gather and preserve intelligence.
Introduces the legislation, guidelines and ethics that relate to the activities of Public Authority III (OSINT) practitioners in the UK & Europe, with explanations of the processes for developing safe and effective policies and procedures.
Explains and demonstrates how a computer should be set-up and made safe for effective investigation processing and how the on-line footprint and fingerprint can be identified and obfuscated for safe processing.
Introduces and explains the lawful basis of a Synthetic Identity (SI) and demonstrates, live and on-line the creation and management of overt & covert SIs for deployment by a Public Authority practitioner.
An explanation of the POLE structure of an investigation, with it’s inherent data standards and a live demonstration of real-time deployment of POLE items during an investigation process.
Explains and demonstrates the safe investigation processes of decision making, contemporaneous note taking, sensitive processing, eForensic security and preparation for eDisclosure. These processes shall be demonstrated time and again during subsequent Live Online Training events, so that the practitioner will acquire the capability to process an investigation for safe and effective prosecution (litigation).
Introduces, explains and demonstrates the Intelligence Grading process and Report composition for an online investigation.
Introduces the Internet and how it developed and explains its structure and the investigative opportunities with live on-line demonstrations of the processes to investigate IP Addresses & Domain Names.
Explains and demonstrates, live and on-line, the processes to investigate entities connected to websites, the Internet of Things and other networked and stand-alone technical resources.
Introduces, explains and demonstrates, live on-line, the processes to locate and investigate people and their Vanity Names.
Introduces a selection of Search Engines and different types of Search Engine, explains and demonstrates, live on-line, the various search queries and techniques that can be deployed to optimise the results.
Advanced Search capabilities explained and demonstrated, live and on-line, with Google as the primary example.
Introduces the many different types of digital files, including still and moving images; then explains and demonstrates, live and on-line, the techniques to locate and extract data and other intelligence from the material.
Introduces, explains and demonstrates, live and on-line, the techniques to investigate online mapping solutions.
Introducing e-mail & telephony resources with explanations and live, on-line demonstrations of the techniques required to exploit these resources.
Introducing messaging apps as an investigative resource, with explanations and live on-line demonstrations of the techniques required to exploit the resource, including emulators.
Introducing the capabilities of Social Media as an investigative resource, with explanations of the processes to identify people through their social media accounts and activities.
Explains and demonstrates how to locate and capture intelligence and material available on the social media platform LinkedIn and other similar platforms.
Explains and demonstrates, live and on-line, how to locate and capture intelligence and material available on the micro-blogging platforms X (formerly Twitter), Threads and other similar platforms.
Explains and demonstrates, live and on-line, how to locate and capture intelligence and material available on many popular photo & video sharing platforms such as TikTok, Instagram, SnapChat & YouTube.
Explains and demonstrates, live and on-line, how to locate and capture intelligence and material that is available on Facebook; including advanced Facebook search techniques.
Introduces, explains and demonstrates, live and on-line, the investigative techniques deployed on several other social media platforms that may be new to the practitioner. There is an emphasis on accessing and investigating foreign language platforms.
Introduces blogs, forums & similar platforms, then explains and demonstrates, live and on-line, how to deploy III (OSINT) techniques to identify people using these resources.
Introducing internet marketplaces and the activity of users, with explanations and live on-line demonstrations of the resources and techniques to identify people and their activities.
Introduces the Blockchain & Cryptocurrencies and explains, with live on-line demonstrations, the investigative capabilities of these online resources.
Introducing the Dark Web with explanations and a live on-line and demonstration of how to access the TOR network to locate intelligence & material.
Introduces Data Breaches, then explains and provides live on-line demonstrations of the processes to locate and capture intelligence.
Introduces the Command Line, and explains and demonstrates, live and on-line, how to locate and gather intelligence.
Introduces and demonstrates, live and on-line, the investigative capabilities of Maltego, Skopenow, Censys and Shodan.
If you need to raise an Purchase Order, Contact us
If you are in the UK, you can make a payment in GBP with VAT included. PAY HERE
If you are in the EU (EEA), you can pay in Euros with the RCM applied. PAY HERE
If you are outside the EU (EEA) or the UK, VAT is not charged.
To request a payment URL, Contact us
A BOOT is open to anyone anywhere with a online investigation remit within any jurisdiction.
The online training, is a blend of portable document files (PDF) containing OSINT training material. The PDF for a module is module delivered to each trainee by e-mail one week before the LOT commences.
For each module, the trainee should allow for 1 to 2 hours of study time, to read the material and perform the exercises, preferably before the Classroom Training for that module.
The time for this activity is included in the CPD. So that of the 90 CPD hours for this course, 40 hours is study time, 46 hours is live training and 4 hours is tests & exam.
The reality is that many delegates read the PDFs in preparation for a Final Exam. That is prudent as the subject matter of many exam questions is covered in the PDFs.
However, to get the most out of the classroom training, where tools, techniques and resources are all demonstrated live and online, it is best to read the PDFs before the live training.
Live Online Training (LOT) events are delivered on Wednesdays.
The maximum duration of a LOT is 240 minutes, though the duration can range from 120 to 180 minutes for some modules.
Each Live Online Training will commence with a Q&A session; so delegates can ask any questions concerning the current module.
After that, the trainer will cover the salient points of the module in some detail.
Processing modules are packed with real-time live demonstrations.
The trainer might set a short quiz to see how you are doing.
The intention is that, by the end of each Live Online Training, every delegate shall have the capability to conduct the OSINT processes relevant to the current module.
With BraveTalk, we provide one URL to connect and the same URL works for all modules on the course.
It is not necessary to download and install the Brave browser. You can connect with any browser, though Brave is a Chromium Browser and so BraveTalk does work better on another Chromium browser.
Learn all about browsers in module 3.
Zoom is not not privacy conscious. Even though Axeten has a premium account, Zoom will try to collect data about people connecting to the LOT.
So why do we use it? Because its popular and people rely on it.
Each LOT can be accessed from your office, from the delegate's home or even from a mobile device.
However, to fully participate and to process any tasks set by the trainer, during the Live Online Training, it's always more productive to use a desktop computer with two displays.
With one display, you can observe the training and on the other display, you can process any tasks set by the trainer.
At the end of each weekly Live Online Training, any client might request that each of their delegates should take a short online test.
The tests are not mandatory, but it is recommended that all delegates take the tests.
The weekly tests allow each trainee to assess their progress and to become familiar with the process, which is the same in the Final Exam.
At the end of the Training, there is an option for each trainee to take final exam and receive a certificate
The final exam is online. Time can be taken to study the printed material before taking the exam.
Each delegate can select their exam date, up to 30 days after the end of the training.
The exam has about 60 multiple choice questions.
Time allowed: 120 minutes.
The candidate will require access to the internet to process live investigations.
Where the 70% pass mark is achieved, CPD credits are awarded.
Otherwise, a Certificate of Attendance is issued with no CPD credits.
Each Live Online Training is recorded.
Delegates that are not able to attend a Live Online Training can request access to the recording.
There is no additional fee for the recording service.
TRAINING MATERIAL MAINTENANCE
Twice a year, Axeten conducts a complete review of all of the training material.
Also, there are reviews for both the Refresher & Updates courses.
Any significant update located during any review is applied to the training material.
All review and update activity is recorded and signed off by a director.
LIFE LONG LEARNING
The best and most cost effective way for you to stay up-to-date is to subscribe to the Life Long Learning programme.
ONLINE REFRESHER COURSE - 8 MODULES
If you don't do that, and you are an occasional OSINT user,
consider taking the OSINT Refresher course. Do this every other year to preserve your capability.
ONLINE OSINT UPDATES COURSE - 4 MODULES
At least once a year, take the OSINT Updates course.
The monthly Axeten OSINT Newsletter provides info about new tools, techniques and resources.
The best of these are built into the next OSINT Updates course.
Subscribe to the OSINT Newsletter.
There are two types of deferral.
1. An organisation may purchase multiple seats in one purchase order, but defer the use of those seats until a later course.
2. A practitioner that starts a course, may for any reason, suspend their participation in the course and defer to a later course.
On the later course, the practitioner can pick-up from where they left off, or start the whole course again.
Scope: A comprehensive and extensive training course, covering all matters relating to III (OSINT).
Audience: For Law Enforcement Officers, and employees of wider Public Authorities with an investigation mandate.
Jurisdiction: This course is not UK or EU centric with the exception of Module 2, Legislation & Policies, where the relevant legislation is predominantly UK & EU
Format: One module each week. Starting with the PDFs and ending with the interactive Live Online Training.
Duration: 19 weeks.
Technical Requirements: No specialist equipment is required, just a standard desktop or laptop computer with a good Internet connection and a Firefox Browser. A webcam and a microphone are optional.
Data Protection: Each organisation and all it's trainees, that take the training are responsible for protecting the data that might be processed during the training. Do not leak data to corporate interests. To do this, avoid use of the Chrome or Edge Browsers.
Copyright: Each recipient of the training is obliged to protect the course material. There is no right to distribute the material to anyone else. This includes people inside your organisation.
Security: Each recipient of the training, and any purchasing organisation, is obliged to ensure that all computers and devices used during the course, are not compromised, so the material is not distributed unintentionally.
Weekly Tests: These are optional but highly recommended where the candidate intends to take the final exam. They allow the trainer to assess your progress and to provide 1-1 assistance if you are having difficulty.
Examination Availability: Each trainee has the option to take a final exam.
Examination Pass Mark: The pass mark for CPD accreditation is 70%. Trainees can retake the final exam.
Certification: All trainees that pass the final exam receive a certificate with the assigned CPD Credits for the course taken. On request, the score attained shall display on the certificate. Certificates of Attendance, with no accreditation, are available.
Accreditation: All of the modules in this course are accredited by The CPD Group.
Volume Discount: 10% on any single Purchase Order for 10 or more places.
Sign-up: Please contact Axeten to sign-up for the training or to request more information.
Open to anyone in Law Enforcement
with an III (OSINT) remit
18 Modules over 21 weeks