
Comprehensive OSINT Specialist program

FormatOnline and in person

Duration40 academic hours

Nearest startDecember 11-15, 2023

Price55,000 ₽Who should study OSINT and why?
https://youtube.com/embed/yIV-Sroeo8E?rel=0&fmt=18&html5=1&showinfo=0OSINT is one of the most popular areas of study today. It is studied by analysts and marketers, lawyers and journalists, IT and information security specialists, managers and line employees. After all, informed means armed, and OSINT provides the means to increase awareness on any issue.
A program of additional training of highly qualified specialists who provide support for making management decisions based on unique information obtained from the open Internet , databases, social networks, darknet, mobile applications, smart gadgets, Internet of Things and other sources. This program can be considered as the next level of professional skill in searching, processing and analyzing information for various areas of activity – from security to marketing and data management.
Includes three modules that describe general OSINT principles and techniques for various business problems, OSINT tools and data sources, and social media-based personality profiling techniques. Each module is a self-contained training course that can be taken separately.

To whom is it addressed?
- Heads of information and analytical departments
- Analysts of all profiles
- IT and big data specialists
- Heads and employees of security departments
- Law enforcement officers and private detectives
Training programOSINT methods for solving complex problems of information retrieval and analysisDuration of the module – 16 academic hours.1Terminology, history, methodology, general principles and legal basis of activity2Working with databases in the digital world
- What personal information is stored in government databases and commercial Internet services?
- What information do we leave ourselves using the Internet and social networks?
- What information do third parties leave about us on the Internet?
- What can you find in leak databases?
- Collection and analysis of user file metadata
3Finding information about people, companies and events
- Maintaining dossiers on monitoring subjects. Activity automation tools
- Case. Search for subjects in offshore jurisdictions
- Case. Due Diligence
4Review of techniques for de-anonymizing users5A new look at search engines
- Logic of search engines, ranking algorithms
- Changes in query language
- Undeclared capabilities of search engines
- Using Google Hacking and Google Dorking Tools
- Alternative search engines and their features
- Possibilities of anonymous presence on the Internet. Anonymizers, proxies and VPNs, paid and free tools
6Searching for information on the invisible Internet
- Working with sources on the “gray internet”, darknet, instant messengers, Tor
- Anonymity of accounts in Telegram. Myths and reality
- Digital traces of cryptocurrency transactions
- Collect information from connected digital devices.
- Using mobile applications, GPS trackers, smart cameras and other IoT to collect information about owners
- Case. Personal identification using digital fingerprints
7Big Data Intelligence
- Big Data Collection
- New analysis methods (enrichment, purification, association, machine learning, neural networks)
- Combining information into logical blocks and testing hypotheses
- Preparation of reports based on the analysis for making management decisions
8Overview of modern OSINT and Internet intelligence tools:
- Palantir, IBM, HPE, Maltego, Lampyre, Avalanche and others. Structuring and visualization of information
9Cases and solutions to typical practical problems for various industries10Master Class. OSINT in economic intelligence
- Analysis of legal entities – key points. The main signs of unreliability of the counterparty and bankruptcy risks.
- Tools for checking the reliability of a counterparty. Services for collecting information about legal entities and various patterns for obtaining information.
- Practical case: methodology for searching for assets using the example of a real enterprise.
OSINT Application ToolkitDuration of the module – 16 academic hours.1Methodology and organization of search
- Methodologies for searching data from open sources
- Filling incoming data with context
2Search and identification of subjects by common starting points (name/nickname, phone numbers, email addresses, etc.)
- The practice of de-anonymization based on various inputs
- Solving practical problems
3Working with open search engines
- Features of working with Google and Yandex search engines
- Dorks and query languages
- Features of working with Internet of Things search engines
- Workshop on using popular dorks in search engines
4Features of collecting information on the invisible Internet
- Special search engines
- Network topology collection tools
- Data Collection Tools
5Analytics tools for data extracted from the Internet
- Extracting data from unstructured arrays
- Creating dependency graphs
- Creating timelines
- Introduction to data analysis using Maltego, Gephi
- Tools for aggregation, storage and structuring of data
6Working with photo and video data
- Identification of people and objects in photos and videos
- Determining the location of people and objects from photos
- Metadata extraction
- Improved visibility in photos and videos
- Detecting fakes and deepfakes
- Workshop. Determining location using specified photos
7Working with audio data
- Cleaning audio recordings from noise
- Isolating the voice of the subject of interest from the general audio background
- Identifying additional useful information from an audio recording
8Basics of radio intelligence
- Hardware Tools Overview
- Device identification
- Tracking device movements using radio identifiers
- Workshop. Building tracking of an observed object using radio identifiers
9Organizing intelligent video surveillance and obtaining data using video analytics10Extracting data from user devices
- Fundamentals and techniques of computer forensics
- Recovering Deleted Data
- Collection of traces left by users in the system
Social profiling. What can a social network tell about a person?Duration of the module – 8 academic hours.1Terminology, history, methodology, general principles and legal basis of activity2Analysis of personal information of a social network profile and biography: interests, hobbies, quotes, relatives, family, etc. Emphases in filling out personal information3Linguistics of posts and reposts. Text profiling of an account: what the text and structure of phrases on the social network say4Analysis of likes and preferences: who, when, how many and on what posts are given likes and other communicative symbols on social networks?
- What do the likes given and received say? Relationship between likes and current interests of the user
- Like parsers, principles and examples of work
- Evaluating and tagging likes according to the most common psychotypologies
5Analytics tools for data extracted from the Internet
- Extracting data from unstructured arrays
- Creating dependency graphs
- Creating timelines
- Introduction to data analysis using Maltego, Gephi
- Tools for aggregation, storage and structuring of data
6Photo: when, with whom and more
- Rules for analyzing photos on social networks: principles and examples
- Principles for evaluating selfies and portrait photographs
- Photo content tagging and psychotypology analysis
7Analysis of groups and subscription pages: which ones, how many, what they are about and what is the activity in them
- Tagging groups
- Evaluation algorithms. Creation of page and group patterns. Examples of tags and their use
8Own posts: how many, what and about what. Analysis of likes, from whom? Tagging your own posts: examples and demonstrations9Reposts: how many, what and about what. Analysis of likes, from whom? Principles for evaluating reposts and their difference from posts and likes10Audio and Music: Analysis of Style and Sequence
- Music and character, correlations between playlist and personality traits
elevenVideo. How is rating video content different from everything else?
- Scenarios and stories in video content. Tagging and basic scenarios
12Tell me who your friends are…
- Main social connections of the account, friends “liked” and ignored
- Finding the most authoritative social connections of a social network account
13Completeness and congruence of profile content
- What to do if the profile is not filled out or is not completely filled out?
- Methods for assessing an incomplete profile. Whitespace tagging and analysis
14Social relationships. Identification of opinion leaders and focuses of attention. Who is this or that account aimed at?15Social networks and scientific psychodiagnostics
- Research on correlations between profiles and the severity of certain personal qualities
16Personal and business profiles. Rules for analyzing a business profile in networks
- How to properly analyze a business profile?
- What can a business profile really tell about its owner?
17Distinctive features of FB, VK, Instagram, Odnoklassniki and other popular social networks
- Principles of analyzing various social networks: what should you pay attention to, and what is information noise?
PricePayment on the siteOSINT Specialist55,000 ₽
Installments possible 0%
PayPayment under the contractOSINT Specialist55,000 ₽
Submit your applicationTeachers
- Andrey MasalovichCurator and leading teacher on Internet intelligence, search and information analysisFounder of the modern school of Internet intelligence in Russia, creator of the Avalanche search engine, president of the Inforus Consortium
- Dmitry BoroshchukOSINT Trainer, Forensic Scientist, Cyber Security ResearcherHead of BeholderIsHere Consulting agency
- Alexey FilatovLeading teacher of operational psychology and profilingInternational profiling expert, developer of the world’s first automated profiling module ProfileCenter
- Vladimir LazarevBusiness analyst at CTSS JSC, independent expert, author of the blog “Exploring Competitors”
Reviews
Leave a review about the courseStill have questions?We will contact you within one business day
+7SendBy leaving a request you agree to
the personal data processing policy

+7 901 189 50 50
general@360sec.ruDirections
Education
- Internet intelligence and OSINT
- Economic security
- Practical psychology and management
- Personnel security
- Information Security
- Engineering and technical protection
- Corporate training
Information
The site uses images from freepik.com
