• cryptoAI
  • Technical OSINT Training

    IOSI109

    Technical OSINT Training

    The rapid technological progress within the IT sector offers both opportunities and challenges for OSINT researchers (both private and government agencies), but also opens the door for (criminal) hackers. To stay one step ahead of these threats, it is essential to view your organization and work processes through the lens of a potential attacker. What are their concerns? How do they penetrate a network? And how do they leave as few digital traces as possible?

    Our Technical OSINT training uses the Cyber ​​Kill Chain to illustrate the different phases a hacker goes through to gain access to your organization. We then focus on the best strategies to secure your organization or research, using the 'Defense in Depth' approach. Attention is paid to physical, technical and administrative security measures and how to apply them.

    Armed with the knowledge of the hacker mindset and technical protection options, we then explore how you can conduct your research digitally while minimizing your digital footprint.

    “The quieter you become the more you are able to hear” – offers a fitting mantra for this training.

    Overview of components Technical OSINT:

    Part 1: Creating awareness about (cyber) threats and the associated techniques.

    Part 2: Application of Threat Modeling and the CIA Triangle for a solid security foundation.

    Part 3: Implementation of operational security measures in both business operations and research.

    Part 4: Understanding and applying the OPSEC process.

    Part 5: Knowledge and insight into the use of hardware and software measures for optimal OPSEC.

    Unit 6: Demonstrations and practical examples to clarify and apply the concepts learned.

    Who is this training developed for?

    This one-day training course is designed for individuals who are active in the field of digital investigations (OSINT) or who wish to gain a deeper understanding of hacking methods and then apply this knowledge to protect themselves or their organization. It is especially beneficial for OSINT researchers, and others whose role requires them to understand hackers' tactics and techniques to increase digital security and create awareness of their own digital footprints.

    Teaching methods: open, closed or customized
    Although this training is mainly offered in a classroom setting, we understand that you may want to ask questions in a private setting due to the nature of your work. We can provide a private training at our location for a minimum of twelve participants. We also offer fully customized training courses, based on (parts of) this training. We are happy to provide you with a tailor-made proposal.

    All our instructors have been screened and have concluded confidentiality agreements with various government services. A specific confidentiality agreement for your organization or service is also possible.

    Certification & Recognition
    Our training institute has been tested by and registered with the CRKBO (Central Register for Short Vocational Education). After completing this training you will receive the IACA certificate:

    Technical OSINT

    Our courses and diplomas are widely recognized and highly regarded by various government services, as well as by a wide range of international organizations outside the government. Whether you already work for such an organization or are pursuing a position with one of these employers, our OSINT training courses are a valuable addition to your CV.

    Subsequent modules

    As additional training you can choose the IOSI101: OSINT Module 1 .

    Number of teaching days

    Minimum prior education

    Training costs

    Start training

    Vacancies

    Flowchart

    OSIDATA