This intensive course focuses on applying the principles and practices of the CRAWL(TM) methodology (Communicate, Research, Analyze, Write, and Listen) to due diligence. Participants will develop a mindset-first approach, framing their investigations and intelligence gathering using Open-Source Intelligence (OSINT) and the CRAWL(TM) method. Learners will explore various types of due diligence investigations, including supply chain, investigative, and intelligence-driven cases.
The course will also cover strategic reasons for government due diligence, essential preparatory steps for successful investigations, and prepping for different analytical report styles. Students will leave this course with the ability to apply critical thinking, analysis and report writing skills in a due diligence setting.
The Foundations of Open-Source Intelligence presents students with the most effective methodologies used by intelligence & investigative professionals and OSINT personnel to locate and analyze information on the Internet. Based on the CRAWL(TM) method, students will use interactive exercises to become familiar with the volume of sensitive data on the Internet and how it can be exploited to develop highly detailed intelligence products. This learner-centric competency-focused education will train students on evidence identification, acquisition, preservation and investigative and analysis processes for traditional physical devices, ubiquitous technologies, cloud accounts and online communication.
This course covers advanced open-source intelligence (OSINT) techniques and topics for analyzing digital behavior to develop intelligence across government and military settings. Course topics include obfuscation tools, geospatial research, website monitoring, code searches, blockchain analysis and dark web investigations.
Through this course, attendees will learn how to track risks across various social media platforms, how to use geospatial tools, and online communities to generate situational awareness. Course examples include tactics and techniques to filter noise, validate threats, build situational awareness dashboards for real time monitoring & crisis response.
One-hour training sessions on emerging techniques for investigative, analytical, & intelligence professionals. These sessions enhance open-source skills and offer CEUs.
Learners will build core skills using the CRAWL(TM) methodology of Communicate, Research, Analyze, Write and Listen in a research setting. This course will prepare learners to develop thorough research plans, analyze digital footprints, apply social network analysis, & refine investigative strategies.
This course provides hands-on training in exploiting AdTech data for intelligence and security applications. This two-day course is designed to give students a solid understanding of how digital exhaust is generated, its use in marketing and targeted advertising and the types of information it comprises. Over the course of the two days, students will be exposed to the ways criminals and threat actors exploit this data to compromise security. Students will receive hand-on training on tools and methods to use this data to create and enhance digital intelligence to combat this type of activity.
Students will be provided with an Android OS device and a Jupyter Notebook for the hands-on portion of this training.