From £3,355 + VAT
Book online today or, if you need help choosing the right course or would like to discuss business discounts, call us on 0113 220 7150.
Sorry, there are currently no dates available to book. Submit an enquiry to hear from one of our team about when dates might become available.
Overview
Who is this course for?
Internet Intelligence & Investigation (I3) enables the user to harvest a rich source of accurate and timely data left by individuals within the digital connected world. The fusion of OSINT with existing conventional methods of intelligence gathering provides the investigator with a formidable tool.
This 5 day course is for staff who work in law enforcement within intelligence or investigative roles.
Due to the level of intrusion, the requirement of covert support and the duration of investigations expected from advanced opensource operatives, there is an expectation of an increased likelihood that the threshold for Regulation of Investigatory Powers (RIPA) authorisation will be met.
Relevant and associated legislation and oversight will be discussed in detail.
Prerequisites
None.
Delegates will learn how to
You will;
- Be able to conduct advanced research and investigative techniques.
- You will be able to recognise the requirement for legal authorities.
- Have an understanding of legal, ethical and moral expectations, building on the foundation of public trust and understand legislative limits.
- Be able to maintain the integrity and security of Internet based accounts.
- Be proficient in the recovery and preparation of Internet product to an evidential standard and deal with product validation.
- Have an understanding of available software to assist in your cyber based investigation.
- Gain understanding of how search engines aggregate the surface web and what search techniques can be utilised to penetrate the deep web.
- Be able to Investigate social media platforms with a greater understanding and ability to recover product not identifiable using simple search techniques.
- Have an overview and understanding of TOR, its applications and hidden services and marketplaces.
- Have an overview and understanding of cryptographic currencies and available software to assist in the investigations.
- Have the ability to conduct image analysis techniques to enhance the intelligence picture.
Outline
Modules within the course are:
- Legislation
- Deep Web searching
- Advanced searching techniques
- Social Media
- Security issues
- Intelligence support including Product Validation
- Evidence preparation and disclosure
- Account access with permission
- Image content analysis
- Overview of TOR
- Overview of Crypto Currencies
Why choose QA
- Award-winning training, top NPS scores
- Nearly 300,000 learners in 2020
- Our training experts are industry leaders
- Read more about QA
Special Notices
QA are proud to be the UK partner for Sorinteq.
Cyber Security learning paths
Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.