Overview

Who is this course for?

Internet Intelligence & Investigation (I3) enables the user to harvest a rich source of accurate and timely data left by individuals within the digital connected world. The fusion of OSINT with existing conventional methods of intelligence gathering provides the investigator with a formidable tool.

This 5 day course is for staff who work in law enforcement within intelligence or investigative roles.

Due to the level of intrusion, the requirement of covert support and the duration of investigations expected from advanced opensource operatives, there is an expectation of an increased likelihood that the threshold for Regulation of Investigatory Powers (RIPA) authorisation will be met.

Relevant and associated legislation and oversight will be discussed in detail.

Read more +

Prerequisites

None.

Read more +

Delegates will learn how to

You will;

  • Be able to conduct advanced research and investigative techniques.
  • You will be able to recognise the requirement for legal authorities.
  • Have an understanding of legal, ethical and moral expectations, building on the foundation of public trust and understand legislative limits.
  • Be able to maintain the integrity and security of Internet based accounts.
  • Be proficient in the recovery and preparation of Internet product to an evidential standard and deal with product validation.
  • Have an understanding of available software to assist in your cyber based investigation.
  • Gain understanding of how search engines aggregate the surface web and what search techniques can be utilised to penetrate the deep web.
  • Be able to Investigate social media platforms with a greater understanding and ability to recover product not identifiable using simple search techniques.
  • Have an overview and understanding of TOR, its applications and hidden services and marketplaces.
  • Have an overview and understanding of cryptographic currencies and available software to assist in the investigations.
  • Have the ability to conduct image analysis techniques to enhance the intelligence picture.
Read more +

Outline

Modules within the course are:

  • Legislation
  • Deep Web searching
  • Advanced searching techniques
  • Social Media
  • Security issues
  • Intelligence support including Product Validation
  • Evidence preparation and disclosure
  • Account access with permission
  • Image content analysis
  • Overview of TOR
  • Overview of Crypto Currencies
Read more +

Why choose QA

Special Notices

QA are proud to be the UK partner for Sorinteq.

Cyber Security learning paths

Want to boost your career in cyber security? Click on the roles below to see QA's learning pathways, specially designed to give you the skills to succeed.

= Required
= Certification
AI Security
Application Security
Cyber Blue Team
Cybersecurity Maturity Model Certification (CMMC)
Cloud Security
DFIR Digital Forensics & Incident Response
Industrial Controls & OT Security
Information Security Management
NIST Pathway
Offensive Security
Privacy Professional
Reverse Engineer
Secure Coding
Security Auditor
Security Architect
Security Risk
Security Tech Generalist
Vulnerability Assessment & Penetration Testing