Introduction to Cyber Intelligence

This introductory course to Cyber Intelligence examines Sherman Kent’s Analytic Doctrine from the cyber perspective while using open source tools to target and gather information in preparation for production and analysis. Students will be able to understand the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course.

In addition, students will understand:

• the use methods of online anonymity;
• the fundamentals behind cyber intelligence collection and analysis and how these current methods can be employed in their organizations;
• how to gather information based upon provided targets;
• how to use several OSINT tools for data collection;
• how to develop personas / sock puppets;
• establish keywords/phrase publishing that can drive perceptions;
• historical, linguistic, cultural, and religious aspects of targeting and collection;
• the basics of Analysis of Competing Hypotheses (ACH) tool and usage;
• how to quickly examine the data for new targeting and potential immediate recommendations and/or opportunities.

 

This is an innovative course focusing on the Web 2.0 world of cyber intelligence targeting and collection. Students will be required to download and use several open source tools building relationships and data points that can eventually be used to create information of value and actionable intelligence. Students will bring immediate skills back to their respective organizations including the ability to gather and analyze their online operational security posture while using the Internet as an investigative tool.

 

Students will be able to understand:

• the differences and intersections between open source data, open source information and open source intelligence;
• the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course;
• the use of online anonymity;
• collection and analysis of online human intelligence, geospatial information, imagery intelligence, and cyber intelligence;
• the fundamentals behind cyber intelligence collection and analysis and how these current methods can be employed in their organizations;
• the basics of Analysis of Competing Hypotheses (ACH) tool and usage;
• The ability to use open source intelligence tools to target, collect, produce and analyze data points into actionable intelligence.

 

What questions will attendees have answered by attending this program?

• how to quickly examine the data for new targeting and potential immediate recommendations and/or opportunities;
• how to gather information based upon provided targets;
• how to use several OSINT tools for data collection;
• how to collect, product and analyze data that provides my organization with a valid view of its online operational security posture;
• what type of information my adversaries know about my organization and how students can use this to enhance organizational security postures through situational awareness.

 

Program logistics and ordering details
This course will be held when 10 or more people have registered. Each class will have a maximum attendance of 25 students.

Price: €2500,- (ex VAT) per student
Please contact for pricing on group training on your location.

Course Length: 5 days
The course takes 5 days to complete and full attendance is mandatory for all students unless express permission has been given to leave early. Professional certification at the end of the course is optional.

Internationally renowned Cyber Intelligence expert Jeff Bardin will be teaching the class in person at your desired location (for groups of 10+ people) or at a location central to the Netherlands.

To register or to inquire for more information, please call +31 (0) 85 4011 639 or contact our Sales department.

Comments are closed.