Using Open Source Intelligence to Mitigate Cyber Threats to your Organization

Malicious actors and social engineers use Open Source Intelligence techniques to find information about Airports that may assist them in an attack. This Introduction to Open Source Intelligence (OSINT) course will provide delegates with skills to become more efficient and effective at finding those key pieces of intelligence that threat actors may use to exploit their organization. This course is a foundation for building effective threat intelligence for your organization. The course is highly practical allowing delegates the time to explore and understand some of the tools and websites available.

Learning Objectives

  • Learn advanced search engine techniques and features

  • Identify websites for finding information on companies

  • Analyse website source code for investigative purposes

  • Use deep web sites and directories

  • Understand internet infrastructure and its use in intelligence gathering and investigation

  • Explain the digital footprint which is left when you are online and the dangers associated there with 

  • Use social media for investigation, intelligence and geolocation

  • Describe the best open source software to use for investigations

  • Access influential internet communities

  • Introduction to the Dark Web, criminal innovation and cybercrime  

Course Content 

Search engines

There are over 6000 search engines; some of the alternatives to Google will be looked at. Google has useful enforced term operators and advanced features that are essential for finding difficult information.

Finding People and Organization Information

There are hundreds of online tools for information gathering and data aggregation on people and companies. The most effective ones are explored.

The Deep Web

Most of the information in the Deep Web is not indexed by standard search engines. This module explores the Deep Web websites and directories.

Advanced searching and source code analysis

Understanding how data is displayed and indexed on the Internet and Web is vital. HTML, Email headers, Robots.txt, Analytics, AdSense and website ranking tools are some techniques covered.

Internet Infrastructure

Extracting useful information from internet infrastructure. This module explains how IP, MAC addresses and the DNS system work and why it is important for Open Source Intelligence.

Social Media

Social media has very rapidly changed the world and as an intelligence source it is arguably unmatched. There are many tools and 3rd party websites that make analysis of this data even easier.

The Internet of Things

Everyday devices are connecting to the Internet at an increasing rate. This has huge implications for OSINT. Google hacks and other websites show how easy it is to gather intelligence from devices connected to the internet.

Software for investigators

Install and use several software applications that help with OSINT research and investigations.

Internet communities and forums

Online communities and forums from Usenet to 4Chan have always been a vital source of intelligence. This module explores these forums as well as ways to search and find others.

The Dark Web

This module covers an introduction to the Dark Web, Tor, other Dark Web software and the breadth of Dark markets.

Online safety and cybercrime

Cybercrime increasingly affects us all. This module discusses Malware such as Viruses, Trojans and DDoS and the opportunities and threats they pose for OSINT.

Target Audience 

The intended audience is anyone who wishes to be able to utilise the Internet and World Wide Web better for finding information about and understanding basic threat intelligence. It will be useful to those in the who want to understand how their airport is exposed on the Internet.

Pre-requisite for Course Registration

There are no prerequisites for this course; however, participants need to have a basic understanding of computers and the internet.

Certification

The ISH Diploma.

Event Properties

Event Date 27/08/19
Individual Price POA
Location ISH – Information Security Hub

Venue Information - ISH – Information Security Hub

As the IT security experts of the Munich Airport, a highly critical infrastructure, we leverage our long-standing experience and our broad partner ecosystem to establish a world-class cyber security competence center.
The die-hard IT security experts from our partners will leverage their expertise and our training infrastructure to the fullest extend. They deliver the perfect mixture of high-level knowledge and hands-on methods for
every participant. Inspiring the participants, bringing back the fun into their demanding jobs and forming them into effective, alert and cunning cyberwarriors.
Our trainings bridge all levels within the IT department and bring together the different parties from C-level to technicians in near real-life scenarios. Through complimentary conferences, events and an exclusive ISH club we will set new standards not only in the context of IT security trainings. But as an enabler of open, cross-department, cross-company and cross-country collaboration, we aim to create a community of highly committed experts who apply their skills and enthusiasm at their workplaces.

We are no longer accepting registration for this event

Location Map

© 2006 - 2019 Oxford Systems. Company Registration No. 4838537 VAT No. 107 2604 47