Intelligence Training

Home > Services > Intelligence Training

We believe that methodology is as important as technology. We provide OSINT and WEBINT training both as part of our project implementation but also as standalone courses to interested parties. S2T has delivered over the years dozens of training courses to our technology customers as well as to training-only customers.

Our course syllabi are constantly updated against changes in the landscape as well as with new techniques and practical tips. While we have standardized syllabi, we customize program delivery to the level and interest areas of the audience. While majority of our training courses are delivered in English, we deliver some of the courses in other languages such as French, Arabic, Russian, Bahasa Indonesia, and Chinese.

Our current list of courses are listed below.

Courses

...
General Course

OSINT for Beginners:
Web-based research and investigation

OSINT Intermediate Course:
Techniques and Tips for Effective Analysis

OSINT Advanced Course:
Methodologies for Extracting Actionable Information from Web-based sources

Dark Web Investigations:
Extract Dark Web information safely and effectively

Social Media Investigations:
Using SOCMINT

Active WEBINT:
Online Engagement and Virtual HUMINT

Mobile Applications as a Source of Intelligence: Gathering targeted information from mobile apps as an ordinary user (no hacking)

The art and science of creating Avatars (Cyber Sock-puppets)

Using Open Source software to meet your WEBINT needs

...
Topical Course

OSINT for Red Teaming:
Reconnaissance tools to find targeted information about servers, devices, and personnel in an organization.

WEBINT for Cybersecurity Analysts
Identify new or imminent threats before incidents happen by tracking vulnerabilities, exploits, information published by analysts and white hat hackers, and discussion on closed forums and markets.

Geospatial WEBINT
Generating geo-specific Web Intelligence, using advanced search techniques and geofencing

Finding the Lone Wolf
Techniques to identify Lone Wolf attackers online, before it is too late

Islamic Extremism online
Where to find relevant online content, how to interpret it, and how to create a target acquisition pipeline
-This course is usually delivered in a manner contextualized for a specific region. We have existing Syllabi and case studies for Europe, Southern Asia, Southeast Asia.

OSINT for Revenue Authorities
How to scan Airbnb, Fiverr, and other marketplaces to detect tax-base erosion

Cryptocurrency Investigations
Track the Blockchain with OSINT

...
GoldenSpear Courses
(only for our technology customers)

GoldenSpear Deep WEBINT User Course

GoldenSpear Deep Fusion User Course

GoldenSpear Data Discovery User Course

GoldenSpear Deep WEBINT Administrator Course

GoldenSpear Deep Fusion Administrator Course

GoldenSpear Data Discovery Administrator Course

GoldenSpear Robot Studio Training
Create your own robots for websites, forums, Dark Web sites, or Social Media.

GoldenSpear Avatar Studio
Creating and Managing Digital Identities

GoldenSpear Data Ingestion for Data Analysts
Creating ingestion workflows to connect to your own data sources

GoldenSpear AutoML
Using AI and ML to predict crime and terrorism

The art and science of creating Avatars (Cyber Sock-puppets)

Using Open Source software to meet your WEBINT needs

Please contact us to learn
how we can meet your training needs.