• Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles

Call us Anton +62-813-8332-6388 (Phone/WA/Telegram)

antonsim@heilandsolutions.com
Rp 0
No products in the cart
Go to shop
Heiland Consulting & TrainingHeiland Consulting & Training
Heiland Consulting & TrainingHeiland Consulting & Training
  • Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles

Open Source Intelligence (OSINT)

May 23, 2020 Posted by Administrator Heiland Information No Comments

Open Source Intelligence Course (OSINT) – in English

Introduction

It is hard to deny the booming popularity of social networking sites, the type of sites that facilitate a high degree of user personalization, and user intercommunication. These site are huge, Facebook has more than 2.45 billion monthly active users. Twitter has more than 1 billion users posting more than 200 million tweets a day. There’s a huge amount of information about users personal life’s being posted every day. People frequently post information about the more mundane aspects of their lives that they would probably not share with someone during verbal conversation. Additionally, users may share their status, news stories, notes, photos, videos, and allow their friends or friends of friends to comment on them. This information can be very valuable to forensic investigations.

It is unavoidable that this platform may also provide incentives for criminals to carry out illegal activates such as drug, sex trading and many others. Also the ever-growing popularity of social networking websites has created a vast security issues such as corporate espionage, social network site aggregators, phishing, theft, bullying, face recognition vulnerabilities, data collection, spam, etc.

The increase in public’s use of social networking services, such as Facebook, Twitter and LinkedIn significantly impacts general counsel’s approach to litigation, investigations, and fraud prevention by providing a new avenue to search for potentially relevant information and evidence.

Learning Objective

During this tree days hands-on course, participants will learn how to determine the nature of online criminal activity and conducting a background check like character, habits, activities, financial information.

It also helps to understand how criminal organizations use online social network to interact, identify victims and conceal their identity. Through facilitated sharing, exercises, group discussions and case studies, you will acquire insights on it helps to identify all of persons involved in the online criminal activities and obtain evidence of the crime from social networking sites and identify potential problems. A workflow of the general techniques used will also be presented using case studies and fraud investigation and execution to minimize collateral damages to individuals and company.

This tree days hands-on course is designed for private professionals, government and police officers, to understand where and how to start information gathering & Darknet investigations . Participants will learn how to safely and legally conduct Dark Web criminal investigations, engage in covert operations, and locate, track and apprehend criminals blending yesterday’s, today’s and tomorrow’s technology. Participants will conduct live exercises and apply unconventional investigative techniques and approaches to Dark Web investigations.

COURSE OUTLINE

Introduction

    • Introduction to OSINT and data collection
    • Modern investigation
    • Understanding URLs and Domain Names
    • Tracing Domains and IP Addresses
    • Social networks in digital form
    • Anatomy of online social network
    • Privacy issues
    • Misuse of social network sites
    • Overview of legal issues for law enforcement
    • Advanced collection frameworks – requirements and strategic
    • Target selection, research and background info
    • Effective web searching
    • Finding target and user profiling

Social Engineering Mapping

    • Social Engineering and phishing
    • Identity theft
    • Real time chat rooms
    • Profile cloning
    • Cyberstalking
    • Hacking accounts
    • Mining unprotected info
    • Social network analysis
    • Contribution of network analysis to online communication
    • Exploratory data analysis and link analysis

Information Gathering and Mapping

    • Trace route, WHOIS tools
    • Advance information gathering and techniques
    • Browser usage, Foreign Language Searchand Translation
    • Finding Hidden and Removed Web Pages/Profiles/Blogs
    • Advanced search engine usage and techniques
    • Determine the identity of a profile’s creator
    • Public and private profile investigation
    • Setup an undercover profile
    • How to use an undercover profile for information gathering
    • History recovery
    • Status update
    • Chat
    • GPS

Social Networking Mapping

    • Social network analysis
    • Contribution of network analysis to online communities
    • Exploratory data analysis and link analysis

Social Engineering

    • Trust and the art of social engineering
    • Types of social engineering
    • Social Engineering Framework
    • Phishing, Vishing, Impersonating attack
    • The Social-Engineer Toolkit (SET)
    • Build a Scam Workshop Dark Web Covert Operations

Introduction to Dark Web and Deep Web

    • Introduction to deep web and hidden databases
    • Tor and routing protocols and security features
    • Access the Dark Web anonymously
    • Navigate within the many layers of the Dark Web
    • Dark Web search engines
    • Dark Web covert operations
    • Finding leaked information

Cryptocurrency

    • Understand blockchain and transaction technologies
    • Set up and run cryptocurrency accounts
    • Build information about specific addresses
    • Access raw data on blockchain ledgers
    • Identify users of cryptocurrencies
    • Extracting cryptocurrencies data from live and imaged computers

Dark Web Monitoring

    • Actionable intelligence
    • Detection of phishing kits
    • Botnet depository identification
    • Identification of compromised accounts
    • Stolen financial data-credit cards, databases, healthcare records and login accounts
    • Personal identifiable information

Maltego in Deep

    • Managing and discovering transforms
    • Build a case
    • People, Names, Email Addresses, Aliases, Organizations information gathering
    • Generate reports

 

Instructor: Ali Fazeli

The instructor has been involved in the information technology filed since his younger days. He later pursed his higher studies in the field of internet security and management from Curtin University, Australia. He is a highly interactive and innovative trainer, whose work in mainly based on research and applied knowledge from extensive experiences in Computer security and Data recovery. He has extensive experience in digital forensic investigation, Anti-forensic and cyber war.

During his 18 years career, he has assisted and trained numerous information technology security professional in Asia. He is accredited as a specialist in the successful investigation and prosecution of fraudsters and other scum from the dark and under world of internet. He is also the one of the most versatile IT security professional and expert, with skills ranging from advisory expert to guidance consultant.

Today, he spent a substantial amount of his time in advising and trains IT security professionals. He has also contributed extensively in helping numerous governments and private organizations to face the information technology risk and security.

 

For more information, please contact :

Phone: 0811-805434 Email: ask@heilandsolutions.com

Phone: Anton 0813-83326388 Email: antonsim@heilandsolutions.com

 

No Comments
0
Share

About Administrator Heiland

This author hasn't written their bio yet.
Administrator Heiland has contributed 22 entries to our website, so far.View entries by Administrator Heiland

You also might be interested in

Confession of a Spy – The Art of Human Hacking (Peter Warmka, Counterintelligence Institute)

Jun 24, 2020

This seminar will be the first collaboration between Heiland Consulting[...]

Pendekatan Komprehensif dalam Pengendalian Massa pada Acara Sepak Bola: Menghadirkan Keamanan dan Keselamatan yang Optimal

May 27, 2023

Andreas Immanuel Mulianto, Dipl. CSMP, SKom, MM, PMP, PSP, CCTP,[...]

Bisnis utama security adalah access control

Bisnis utama security adalah access control

Oct 25, 2018

oleh: Andreas Immanuel Mulianto, SKom, MM, PSP, PMP   Apabila[...]

Leave a Reply

Your email is safe with us.
Cancel Reply

Articles

  • Konsep IAAA dalam Keamanan Fisik
  • Pentingnya Penerapan CPTED dalam Pembangunan Fasilitas
  • Pendekatan Komprehensif dalam Pengendalian Massa pada Acara Sepak Bola: Menghadirkan Keamanan dan Keselamatan yang Optimal
  • Ilusi Kompetensi dalam Bidang Keamanan: Mengenal, Menghadapi, dan Mencegahnya
  • Menjamin Keamanan Kampus: Pentingnya Security Risk Assessment (Physical dan Cyber) di Lingkungan Kampus dan Perumahan Kampus

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message

heilandsolutions

heilandsolutions

Contact Info

  • Anton Sim
  • +62 813 8332 6388/+62 811 805 434 (Call/WhatsApp/Telegram)
  • antonsim@heilandsolutions.com ask@heilandsolutions.com

© 2025 · www.heilandsolutions.com

Prev Next