Dec 2020

Open Source Intelligence for Corporate Security Professionals

Course Information

Start Date7 Dec 2020, Monday
End Date9 Dec 2020, Wednesday
Time09:00 am - 05:00 pm
Venue100 Orchard Road, Concorde Hotel Singapore
Contact6720 3333 (Ms Chye Fen) training.aventis@gmail.com
Register Now
Get Group Quote
LIVE Stream


In this 3-day hands-on course, students will learn the tools and techniques used in the field of Open Source Intelligence. With special emphasis on social media monitoring, research and analysis, this training is designed to enable security professionals to better discover, evaluate and understand threats, and to conduct efficient online investigations on individuals and organizations. Upon completion of the training, participants will gain better understanding of their role in the Intelligence Cycle; become familiar with a wide range of social media platforms and the tools and techniques that are needed in order to get the most out of these sources; be able to build a real-time threat-detection system and implement it on any computer; be able to conduct online investigations to uncover a target's background and network of contacts, while staying safe and not compromising their online identity; understand and use advanced analytic techniques

Course Objectives

Security professionals, analysts and investigators will understand the importance of OSINT for the corporate security industry; learn their role in the intelligence cycle; build a threat-detection system and conduct investigations; improve their analytic skills.

Level: Intermediate (3rd day: intermediate-advanced)

Course Outlines (Day 1)
  • OSINT Usefulness and Relevance for Corporate Security: Use Cases
  • Threat detection
  • Unrest monitoring
  • Operating in high-risk regions
  • Due diligence and investigations
  • The Intelligence Cycle
  • Intelligence requirements
  • Monitoring and collection
  • Processing
  • Analysis
  • Dissemination
  • Preparing the Computer for Online Investigations:
  • Staying safe
  • Anonymity
  • How to not compromise your investigation
Course Outlines (Day 2)
  • Building a Real-Time Alert System
  • Techniques
  • Keyword searches using boolean operators
  • Username lists
  • Geo-searches
  • Tools
  • Tweetdeck, Hootsuite
  • Conducting Investigations
  • Where to look: Sources
  • How to look: Tools and techniques
  • How it all comes together: What can we learn from a target’s name, username, email address, or phone number
Course Outlines (Day 3)
  • Structured Analytic Techniques
  • Overview
  • Diagnostic techniques
  • Contrarian techniques
  • Imaginative thinking techniques
  • Exercises:
  • Devil’s Advocacy
  • Team A/Team B
  • “What If?” Analysis
  • Alternative Futures Analysis
Trainer's Profile

Mr. Livne started his career more than 20 years ago as a linguist and analyst in the IDF elite technological intelligence unit (8200), Israel.
Mr. Livne has worked for various governments, tech companies, intelligence firms and media outlets in Israel, the US, and the UK. Among various roles, Mr. Livne served as a Field Open Source Officer at the US Government’s Open Source Enterprise where he was trained on advanced monitoring, collection, research and analysis tools and techniques and received two Exceptional Performance Awards.