Qwarie OSINT Training Modules

Qwaire OSINT Training Modules

The Online training, the Distance Learning Course & the Classroom training all use the same 15 modules

Modular Prices, Upgrades & Discounts

 

No. Module Name Description
1A Introduction to the training Introducing the process of the course, your trainer & Qwarie
1B Introducing OSINT Part 1 The Use of Open Source Intelligence in Investigations.  This module is mandatory
1C Introducing OSINT Part 2 Implications of Undertaking Online Research about People. This module is mandatory
2 Legislation & Policies Relevant to OSINT in the UK & Europe. The Public Authority version of this module is significantly longer, covering IPA2016 & CPS Guidelines
3 Creating and Managing a False Persona Explains and demonstrates the set up of an effective online false persona for OSINT research purposes
4 Computer Security & Footprints Explains and demonstrates how a computer can be kept safe and how its on-line footprint can be identified & altered
5

Understanding The Internet & Investigating Websites

Explains how the Internet developed, its structure of Domain Name and the basic process of investigating websites, which has changed a lot since the GDPR and derivative legislation which was covered in Module 2
6A Google & Advanced Search Techniques Explains how best to carry out online research using Google, the most popular search engine
6B Other Search Engines & Meta Search Engines Explains how best to carry out online research using a variety of search engines, to locate relevant information
7A Introduction To Social Media Platforms Identifying People Through Their Social Media Activities
7B LinkedIn & Similar Platforms Demonstrates the wealth of information stored on the social media site LinkedIn and other similar sites. Includes Practical examples
8A Photo & Video Social Media Platforms Demonstrates the wealth of information available from digital images, from the popular photo & video related social media sites such as Instagram & YouTube. Includes Practical examples.
8B Twitter Demonstrates the wealth of information stored on the popular social media sites Twitter. Includes Practical examples
9A Facebook Demonstrates the wealth of information stored on the popular social media sites Facebook and how to use advanced techniques to find accurate and valuable information. Includes Practical examples
9B Other Social Media Platforms Introduces to the trainee to a number of popular social media sites that they may not have yet encountered, including VK / OK - with practical training tasks
10 Databases & How To Use Them as An Investigative Resource Introduces and demonstrates the many databases available to an OSINT researcher
11A Researching People Using Blogs, Forums & Similar Platforms Demonstrates the wealth of information stored in blogs, forums & similar sites and how to use advanced OSINT techniques to find assist in identifying those posting to them or using them
11B Researching People Using Online Sales & Auctions Sites Shows the delegates the search tools and techniques to use to identify those behind postings & accounts for online sales and auction sites
12 Researching Digital Images & Photographs Online This module covers the number of investigative options open to you when Researching Digital Images & Photographs from Online site
13 Understanding Emails as an Investigative Resource Explains and demonstrates the structure of an email address and how to trace all types of email
14A Other Online Investigative Resources Demonstrates how to use other investigative techniques available to the OSINT researcher, (including The Internet of Things) - with practical training tasks
14B An Introduction To The Dark Web Provides an overview of the Dark Web
15A Grading Open Source Intelligence A practical look at grading Open Source Intelligence
15B Using The mSIS Lite online Research & Reporting Tool A free Online Research & Reporting Tool
15C OSINT Research Reporting & Flowcharts Graphic reporting techniques
15D SWOT Analysis of OSINT Explains the implications for the OSINT researcher while deploying a Chrome browser or Google search since the GDPR and DPA 2018