Course Description

This program equips participants with skills to collect, analyze, and leverage publicly available information for cybersecurity, threat intelligence, and investigative purposes. The course covers OSINT tools, social media intelligence, geolocation, data aggregation, and reporting techniques. Participants learn how to conduct structured investigations, discover hidden relationships, and improve organizational threat awareness. The program is designed for security analysts, investigators, and threat intelligence professionals.

Course Objectives

Upon completion of this course, participants will be able to:

  • Understand the principles and methodology of OSINT.
  • Use OSINT tools and techniques to collect data from publicly available sources.
  • Analyze social media, websites, and public records for actionable intelligence.
  • Conduct geolocation and link analysis for investigative purposes.
  • Prepare professional OSINT reports and communicate findings effectively.

Who Should Attend?

This course is designed for cybersecurity analysts, threat intelligence professionals, security consultants, investigative officers, risk managers, and IT security professionals responsible for gathering and analyzing open-source data.

Course Agenda

Registration

Welcome & Introduction

Pre-Test

Day 1: OSINT Fundamentals

  • Introduction to Open-Source Intelligence (OSINT)
  • Ethical and legal considerations in OSINT
  • Data collection methodologies and frameworks
  • Overview of OSINT tools and platforms

Day 2: Practical OSINT Techniques

  • Social media intelligence (Twitter, LinkedIn, Facebook, Instagram)
  • Public records, domain and IP information gathering
  • Geolocation and mapping analysis
  • Identifying relationships and patterns from collected data
Day 3: Analysis, Reporting & Applications

  • Data aggregation and correlation techniques
  • Threat intelligence applications of OSINT
  • Writing professional intelligence reports
  • Case studies, exercises, and program review
  • Key takeaways and next steps

Post Test

End of the Course

Assessment Methodology

All courses conducted by EdTech will begin with a Pre-evaluation and end with a Post-evaluation. The instructor will evaluate the knowledge and skills of the participants according to the feedback given by participants. This will help to recognize the benefits and the level of knowledge gained by participants through the course.

Training Methodology

Facilitated by a highly qualified specialist, who has extensive knowledge and experience; this program will be conducted using extensively interactive methods, encouraging participants to share their own experiences and apply the program material to real-life work situations in order to stimulate group discussions and improve the efficiency of the subject coverage.

Percentages of the total course hour classification are:

  • ​40% Theoretical lectures, Concepts and approach
  • 20% Motivation to develop individual skill and Techniques
  • 20% Case Studies and Practical Exercises
  • 20% Topic General Discussions and interaction

Course Manual

Participants will be provided with comprehensive presentation material as reference manual. This presentation material is a compilation of core valuable information, references, presentation methods and inspiring reading which will be used as a part of the material guide.

Course Certificate

At the completion of the course, all participants who successfully accomplished the required contact hours will receive an EdTech Training Participation Certificate as a testimony to their commitment to professional development and further education.

Why Edtech ?

  • Industry Experienced; Internationally Qualified Trainers
  • Hands-on Practical Sessions & Assignments
  • Intensive Study materials
  • Flexible Schedules
  • Realistic training methodology
  • High-Quality Training in Affordable Course Fees
  • Achievement Certificate, as approved by the Ministry of Education (Abu Dhabi Center for Technical and Vocational Education Training - ACTVET), HABC, AWS, IAOSHE, SHRM, etc.