An Advanced and Comprehensive III (OSINT) Classroom Training over 10 days for Public Authorities

This Course is no longer available as a classroom training. It is available as a Blended Online OSINT Training (BOOT).

The Advanced Open Source Intelligence Classroom Training is a comprehensive course for Law Enforcement Internet Investigations & Intelligence (III) practitioners.

A 10 day private group training, moving at a steady pace, to deliver all eighteen modules covering everything a Public Authority employee needs to know about III (OSINT) investigations.

This Blended Classroom OSINT Training (BCOT) is an 'open' course. However, only employees of a public authority may participate.

The Advanced OSINT training is available as a Blended Online OSINT Training (BOOT).

Course Code Class: BCOT-U-A

CPD Credits: 90 Hours

TRAINING OBJECTIVES

The Advanced course for Law Enforcement Officers introduces, explains and demonstrates, live and online, the many other resources that make up the complete attack surface available to the OSINT practitioner. The Foundation component teaches the structure and legality of the process and explains how to stay safe while being effective. The Essential Tools and Resources component focuses on the importance of verifying the identity of a subject. Every OSINT practitioner should have this knowledge and the relevant skill sets to process investigations safely.

The investigative techniques taught include advanced searching of Google and other search engines, the special techniques required to locate and effectively research the multitude of social media platforms and hundreds of online databases, websites, images, e-mails and other messaging applications and other online resources such as marketplaces, blogs, forums, archives, gaming and gambling platforms, and technical assets that include but are not limited to domains, networks and the Dark Web, Data breach and leaks, Command Line investigations and advanced applications for OSINT.

LEARNING OUTCOMES

The Law Enforcement practitioner will acquire the capability to safely deploy an investigation, in compliance with the legislation and how to locate and connect people and organisations through their online activity, even where an entity might have no intended on-line presence. The trainee will have the capability to safely gather intelligence and material, grade the evidence and compose a report with all of the attributes required for safe and effective prosecution and where required, with graphic presentations of the evidence.

SIGN-UP ONLINE

BOOT-U-A PRICE: £14,990 + VAT PAY NOW

MODULES COVERED IN THE ADVANCED III (OSINT) COURSE

Module 1 - Day 1 - Morning - Session 1

1A

An induction to the training, introducing the scope, process and assessment of the course with explanations of the legal obligations.

1B

Introducing the capabilities of internet intelligence and investigations.

1C

Introduces and explains the principles of gathering open source intelligence with an overview of the processes deployed to gather and preserve intelligence.

Module 2 U - Day 1 - Morning - Session 1

Introduces the legislation, guidelines and ethics that relate to the activities of Public Authority III (OSINT) practitioners in the UK & Europe, with explanations of the processes for developing safe and effective policies and procedures.

Module 3 - Day 1 - Morning - Session 2

Explains and demonstrates how a computer should be set-up and made safe for effective investigation processing and how the on-line footprint and fingerprint can be identified and obfuscated for safe processing.

Module 4 U - Day 1 - Afternoon - Session 1

Introduces and explains the lawful basis of a Synthetic Identity (SI) and demonstrates, live and on-line the creation and management of overt & covert SIs for deployment by a Public Authority practitioners.

Module 5 - Day 1 - Afternoon - Session 2

5A

An explanation of the POLE structure of an investigation, with it’s inherent data standards and a live demonstration of real-time deployment of POLE items during an investigation process.

5B

Explains and demonstrates the safe investigation processes of decision making, contemporaneous note taking, sensitive processing, eForensic security and preparation for eDisclosure. These processes shall be demonstrated time and again during subsequent Live Online Training events, so that the practitioner will acquire the capability to process an investigation for safe and effective prosecution (litigation).

5C

Introduces, explains and demonstrates the Intelligence Grading process and Report composition for an online investigation.

Module 6 - Day 2 - Morning - Sessions 1 & 2

6A

Introduces the Internet and how it developed and explains its structure and the investigative opportunities with live on-line demonstrations of the processes to investigate IP Addresses & Domain Names.

6B

Explains and demonstrates, live and on-line, the processes to investigate entities connected to websites, the Internet of Things and other networked and stand-alone technical resources.

6C

Introduces, explains and demonstrates, live on-line, the processes to locate and investigate people and their Vanity Names.

Module 7 - Day 2 - Afternoon - Session 1

7A

Introduces a selection of Search Engines and different types of Search Engine, explains and demonstrates, live on-line, the various search queries and techniques that can be deployed to optimise the results.

7B

Advanced Search capabilities explained and demonstrated, live and on-line, with Google as the primary example.

Module 8 - Day 2 - Afternoon- Session 2

8A

Introduces the many different types of digital files, including still and moving images; then explains and demonstrates, live and on-line, the techniques to locate and extract data and other intelligence from the material.

8B

Introduces, explains and demonstrates, live and on-line, the techniques to investigate online mapping solutions.

Module 9 - Day 3 - Morning - Session 1

9A

Introducing e-mail & telephony resources with explanations and live, on-line demonstrations of the techniques required to exploit these resources.

9B

Introducing messaging apps as an investigative resource, with explanations and live on-line demonstrations of the techniques required to exploit the resource, including emulators.

Module 10 - Day 3 - Morning - Session 2

10 A

Introducing the capabilities of Social Media as an investigative resource, with explanations of the processes to identify people through their social media accounts and activities.

10B

Explains and demonstrates how to locate and capture intelligence and material available on the social media platform LinkedIn and other similar platforms.

10C

Explains and demonstrates, live and on-line, how to locate and capture intelligence and material available on the micro-blogging platform Twitter and other similar platforms.

Module 11 - Day 3 - Afternoon - Sessions 1 & 2

Explains and demonstrates, live and on-line, how to locate and capture intelligence and material available on many popular photo & video sharing platforms such as TikTok, Instagram, SnapChat & YouTube.

Module 12 - Day 4 - Morning - Sessions 1 & 2

12A

Explains and demonstrates, live and on-line, how to locate and capture intelligence and material that is available on Facebook; including advanced Facebook search techniques.

12B

Introduces, explains and demonstrates, live and on-line, the investigative techniques deployed on several other social media platforms that may be new to the practitioner. There is an emphasis on accessing and investigating foreign language platforms.

Module 13 - Day 4 - Afternoon - Session 1

13A

Introduces online databases that can be accessed by the practitioner with explanations and live on-line demonstrations of the processing techniques.

13B

Processing News media resources worldwide with fact checking.

Module 14 - Day 4 - Afternoon - Session 2

14A

Introduces blogs, forums & similar platforms, then explains and demonstrates, live and on-line, how to deploy III (OSINT) techniques to identify people using these resources.

14B

Introducing internet marketplaces and the activity of users, with explanations and live on-line demonstrations of the resources and techniques to identify people and their activities.

Module 15 - Day 5 - Morning - Session 1

15A

Introduces the Blockchain & Cryptocurrencies and explains, with live on-line demonstrations, the investigative capabilities of these online resources.

15B

Introducing the Dark Web with explanations and a live on-line and demonstration of how to access the TOR network to locate intelligence & material.

Module 16 - Day 5 - Morning - Session 2

Introduces Data Breaches, then explains and provides live on-line demonstrations of the processes to locate and capture intelligence.

Module 17 - Day 5 - Afteroon - Session 1

Introduces the Command Line, and explains and demonstrates, live and on-line, how to locate and gather intelligence.

Module 18 - Day 5 - Afternoon - Session 2

Introduces and demonstrates, live and on-line, the investigative capabilities of Maltego, Skopenow, Censys and Shodan.

A BCOT is for closed groups where only delegates assigned by the client organisation can attend.

The private training, is a blend of portable document files (PDF) containing OSINT training material delivered to each trainee by e-mail at least one week before the course commences.


For each module, the trainee should allow for 1 to 2 hours of study time, to read the material and perform the exercises, preferably before the Classroom Training for that module.

The time for this activity is included in the CPD. So that of the 90 CPD hours for this course, 46 hours is study time, 40 hours is live training and 4 hours is tests & exam.

The reality is that many delegates read the PDFs in preparation for a Final Exam.  That is prudent as the subject matter of many exam questions is covered in the PDFs.
However, to get the most out of the classroom training, where tools, techniques and resources are all demonstrated live and online, it is really important to read the PDFs before the live training.

5 Days

CPD Credits: 90

The price is £11,550 + VAT

Trainer travel and accommodation expenses are not included in the price.

You can arrange and pay for the travel and accommodation.
Please be mindful of the budget for taxis and other out-of pocket expenses.


Axeten can book the travel & accommodation.
These items will be invoiced as expenses and charged at cost.

For a training event outside the UK, travel days for the trainer are charged at £500 each day

The maximum recommended quantity of trainees for a private training is 12.
If you want to seat more people on the Advanced OSINT course, that is your choice.
If you would like us the provide an assistant trainer, please ask.
For the Advanced OSINT course, an assistant trainer will be a huge help particularly for days 3 & 4.
If your trainees have low technical skills, then you should probably take the assistant trainer when there are more than 8 trainees for days 2 thru 5.

The customer shall provide the training facility.

The facility must have a fast and reliable internet connection that everyone can access.
All delegates should have a laptop computer with a large screen (13" minimum).

Also, the trainer shall require a large video monitor display or a projector and white screen.
The trainer will connect their laptop to the display or the projector.

Please do not provide an old style 'over-head' projector or a slide projector.
They are not compatible with our technology and we will not be able to deliver the training.

The trainer is a highly experienced, ex-law enforcement officer.

The trainer provides explanations and where appropriate, live demonstrations, so that all delegates are sure they understand the subject matter of the current module.

At the end of the Training, there is an option for each trainee to take final exam and receive a certificate
The final exam is online. Time can be taken to study the printed material before taking the exam.
Each delegate can select their exam date, up to 30 days after the end of the training.
The exam has about 60 multiple choice questions.
Time allowed: 120 minutes.
The candidate will require access to the internet to process live investigations.
Where the 70% pass mark is achieved, CPD credits are awarded.
Otherwise, a Certificate of Attendance is issued with no CPD credits.

TRAINING MATERIAL MAINTENANCE

Twice a year, Axeten conducts a complete review of all of the training material.
Also, there are reviews for both the Refresher & Updates courses.
Any significant update located during any review is applied to the training material.
All review and update activity is recorded and signed off by a director.

 

LIFE LONG LEARNING

The best and most cost effective way for you to stay up-to-date is to subscribe to the Life Long Learnng programme.

 

ONLINE REFRESHER COURSE - 8 MODULES

If you don't do that, and you are an occasional OSINT user,
consider taking the OSINT Refresher course. Do this every other year to preserve your capability.

 

ONLINE OSINT UPDATES COURSE - 4 MODULES

At least once a year, take the OSINT Updates course.

The monthly Axeten OSINT Newsletter provides info about new tools, techniques and resources.
The best of these are built into the next OSINT Updates course.
Subscribe to the OSINT Newsletter.

Satisfactory completion of the 18 Module Advanced course, grants access to the Life Long Learning programme.

Scope: A comprehensive and extensive training course, covering all matters relating to III (OSINT).

Audience: A Training for Law Enforcement Officers, and employees of wider Public Authorities with an investigation mandate.

Jurisdiction: This course is not UK or EU centric, with the exception of Module 2, Legislation & Policies, where the relevant legislation is predominantly UK & EU

Format: Classroom training supported with PDFs

Duration: 5 Intensive Days

Technical Requirements: No specialist equipment is required, just a standard desktop or laptop computer with a good Internet connection and a Firefox Browser.

Data Protection: Each organisation and all it's trainees, that take the training are responsible for protecting the data that might be processed during the training. Do not leak data to corporate interests. To do this, avoid use of the Chrome or Edge Browsers.

Copyright: Each recipient of the training is obliged to protect the course material. There is no right to distribute the material to anyone else. This includes people inside your organisation.

Security: Each recipient of the training, and any purchasing organisation,  is obliged to ensure that all computers and devices used during the course, are not compromised, so the material is not distributed unintentionally.

Module tests: These are recommended but optional and can be taken after the end of the course, during revision, in preparation for the final exam.

Examination Availability: Each trainee has the option to take a final exam within 30 days of the end of the training.

Examination Pass Mark: The pass mark for CPD accreditation is 70%. Trainees can retake the final exam.

Certification: All trainees that pass the final exam receive a certificate with the assigned CPD Credits for the course taken. On request, the score attained shall display on the certificate. Certificates of Attendance, with no accreditation, are available.

Accreditation: All of the modules in this course are accredited by The CPD Group.

Sign-up: Please contact Axeten to sign-up for the training or to request more information.