Course Description

To prepare students to apply new and emerging thinking and skills that can be used to provide intelligence support as a result of methodologically researching the surface, deep, and dark web to find information of intelligence value. Students are also taught the history of the internet, social media, and internet security. Students will learn the basic procedures for setting up their computer at the browser, computer, and internet levels which includes information on how to mask their digital identities. The course provides real world examples and case studies in an exercise environment that encourages students to utilize creative and critical thinking skills. This course also includes numerous exercises and analytic tool demonstrations where real world analysis allows the student to see how their newfound skills can be applied.

Course curriculum

  • 1

    Module 0

    • Pre-Course Survey

    • OSIA Introduction Video

    • OSIA Syllabus

    • Course Learning Outcomes

    • OSIA Learning Objectives

  • 2

    Module 1 - Introduction to Intelligence

    • 1.1 - Intelligence

    • 1.2 - Estimative Language

    • 1.3 - Writing for OSINT

    • 1.4 Origins of OSINT

    • 1.5 - Overview of Intelligence Disciplines

    • Module 1 Learning Check

  • 3

    Module 2 - Introduction to Social Media

    • 2.1 - Social Media Introduction

    • 2.2 - Social Media and Common Features

    • 2.3 - Social Media Usage

    • 2.4 - Social Media Terminology

    • Module 2 Learning Check

  • 4

    Module 3 - Introduction to Analysis

    • 3.1 - Introduction to Analysis

    • 3.2 - Social Media Analysis

    • 3.3 - Target Market Analysis

    • 3.4 - Sentiment Analysis

    • 3.5 - Social Network Analysis

    • Module 3 Learning Check

  • 5

    Module 4 - Critical Thinking for Analysts

    • 4.1 - The Nature of Thought

    • 4.2 - Problem Solving

    • 4.3 - Critical Thinking

    • 4.4 - Traits of a Critical Thinker

    • 4.5 - Critical Thinking Part II

    • 4.6 - Critical Thinking Vignette

    • 4.7 - Media Bias and Propaganda

    • Module 4 Learning Check

  • 6

    Module 5: The Psychology of Analysis

    • 5.1 Priming

    • 5.2 - Anchoring

    • 5.3 - The Availability Heuristic

    • 5.4 - Amphiboly

    • Module 5 Learning Check

  • 7

    Module 6 - Social Media In-Depth

    • 6.1 - Social Network Analysis

    • 6.2 - Microblogs

    • 6.3 - Photo Sharing Sites

    • 6.4 - Video Sharing Sites

    • 6.5 - OSINT Sources

    • Module 6 Learning Check

  • 8

    Module 7 - Managing Attributions

    • 7.1 - Privacy and Data

    • 7.2 - Components of the Web

    • 7.3 - Digital Footprint

    • 7.4 - Signature Management

    • Module 7 Learning Check

  • 9

    Module 8 - Research Foundations

    • 8.1 - Requirements and Research Plan

    • 8.2 - Analytical Process

    • 8.3 - Google Dorking

    • 8.4 - Translation Tools

    • Optional - Research Plan Assignment

    • Module 8 Learning Check

  • 10

    Module 9 - CID and D2M Workflows

    • 9.1 - CID and D2M Overview

    • 9.2 - CID & D2M Workflow Scenario I

    • 9.3 - CID & D2M Workflow Scenario II

    • 9.4 - CID & D2M Workflow Scenario III

    • Module 9 Learning Check

  • 11

    Module 10 - Situational Practical Exercise and Assessment

    • 10.1 - Situational Practical Excercise

    • 10.2 - Situational Practical Exercise II

    • 10.3 - Situational Practical Exercise III

    • 10.4 - OSIA Assessment

    • End of Course Survey