What OSINT professionals are Saying About This Course

5 star rating

OSIA Course

James Woodford

5 star rating

Overview

joseph love

Seemed to explain everything thoroughly.

Seemed to explain everything thoroughly.

Read Less
5 star rating

Enjoyed it!

DesRae Baker

Great job at defining what is coming during this course.

Great job at defining what is coming during this course.

Read Less
5 star rating

A great introduction to OSINT methodoloy

Nikolas Barkley

As someone who has somewhat limited experience in direct OSINT collection outside of google searches and social media, this course was a great introduction t...

Read More

As someone who has somewhat limited experience in direct OSINT collection outside of google searches and social media, this course was a great introduction to the tools and methodology used to dive deeper and gather meaningful data and information.

Read Less

Course Description:

Students will engage in critical thinking during this course and apply analysis techniques using a practical application of the Discover, Develop, Monitor (D2M™) methodology through a basic overview of social media platforms and publicly available information. This is the foundation for learning the advanced application of D2M™, predictive analysis, scenario development, and indicators and warnings within the context of real-world intelligence and business requirements. Students will learn the basic procedures for setting up their computers and internet browsers, including information on how to mask their digital identities. The course also provides real-world examples and case studies to encourage students to use creative and critical thinking skills.

Course Syllabus: Open-Source Intelligence Analysis.pdf

Course curriculum

  • 1

    Course Admin

    • OSIA Introduction Video

    • Pre-Course Questionnaire

    • Course Syllabus

    • Course Learning Objectives

    • Introduction to OSIA

  • 2

    Module 0: Core Basics

    • 0.1 - Historical Beginnings of OSINT

    • 0.2 - The Categories of OSINT

    • 0.3 - The EAG OSINT Methodology

    • 0.4 - EAG Designed OSINT Career Paths

    • 0.5 - Accessing the Cyber Intelligence Dashboard (CID)

    • 0.6 - CID Demonstration

  • 3

    Module 1 - Introduction to Intelligence

    • 1.1 - Intelligence

    • 1.2 - Estimative Language

    • 1.3 - Writing for OSINT

    • 1.4 - Origins of OSINT

    • 1.5 - Overview of Intelligence Disciplines

    • Module 1 Learning Check

  • 4

    Module 2 - Introduction to Social Media

    • 2.1 - Social Media Introduction

    • 2.2 - Social Media and Common Features

    • 2.3 - Social Media Usage

    • 2.4 - Social Media Terminology

    • Module 2 Learning Check

  • 5

    Module 3 - Introduction to Analysis

    • 3.1 - Introduction to Analysis

    • 3.2 - Social Media Analysis

    • 3.3 - Target Market Analysis

    • 3.4 - Sentiment Analysis

    • 3.5 - Social Network Analysis

    • Module 3 Learning Check

  • 6

    Module 4 - Critical Thinking for Analysts

    • 4.1 - The Nature of Thought

    • 4.2 - Problem Solving

    • 4.3 - Critical Thinking

    • 4.4 - Traits of a Critical Thinker

    • 4.5 - Critical Thinking Part II

    • 4.6 - Critical Thinking Vignette

    • 4.7 - Media Bias and Propaganda

    • Module 4 Learning Check

  • 7

    Module 5: The Psychology of Analysis

    • 5.1 Priming

    • 5.2 - Anchoring

    • 5.3 - The Availability Heuristic

    • 5.4 - Amphiboly

    • Module 5 Learning Check

  • 8

    Module 6 - Social Media In-Depth

    • 6.1 - Social Network Analysis

    • 6.2 - Microblogs

    • 6.3 - Photo Sharing Sites

    • 6.4 - Video Sharing Sites

    • 6.5 - OSINT Sources

    • Module 6 Learning Check

  • 9

    Module 7 - Managing Attributions

    • 7.1 - Privacy and Data

    • 7.2 - Components of the Web

    • 7.3 - Digital Footprint

    • 7.4 - Signature Management

    • Module 7 Learning Check

  • 10

    Module 8 - Research Foundations

    • 8.1 - Requirements and Research Plan

    • 8.2 - Analytical Process

    • 8.3 - Google Dorking

    • 8.4 - Translation Tools

    • Research Plan Assignment

    • Module 8 Learning Check

  • 11

    Module 9 - CID and D2M Workflows

    • 9.1 - CID & D2M Workflow Scenario I

    • 9.2 - CID & D2M Workflow Scenario II

    • 9.3 - CID & D2M Workflow Scenario III

    • Module 9 Learning Check

  • 12

    Module 10 - Situational Practical Exercise and Assessment

    • 10.1 - Situational Practical Exercise

    • 10.2 - Situational Practical Exercise II

    • 10.3 - Situational Practical Exercise III

    • End of Course Qualification Assessment

    • End of Course Survey