We believe that methodology is as important as technology. We provide training as part of our project implementation but also as standalone courses to interested parties. S2T has delivered over the years dozens of training courses to our technology customers as well as to training-only customers.
Our course syllabi are constantly updated against changes in the landscape as well as with new techniques and practical tips. While we have standardized syllabi, we customize program delivery to the level and interest areas of the audience. While majority of our training courses are delivered in English, we deliver some of the courses in other languages such as French, Arabic, Russian, Bahasa Indonesia, and Chinese.
Our current list of courses are listed below.
For Beginners:
Web-based research, investigation fundamentals, and OSINT methodology
Intermediate Course:
Techniques and Tips for Effective Analysis
Advanced Course:
Methodologies for Extracting Actionable Information from Web-based sources
Dark Web Investigations:
Extract dark web information safely and effectively; using SOCMINT across open and closed platforms
Active Collection:
Online Engagement and Virtual HUMINT
Mobile Applications as a Source of Intelligence:
Gathering targeted information from mobile apps as an ordinary user (no hacking)
AI Tools for Intelligence Analysis:
Leveraging AI-assisted collection, entity extraction, and automated link analysis to accelerate investigations
Using Open Source Software to Meet Your Needs
For Red Teaming:
Reconnaissance tools to find targeted information about servers, devices, and personnel in an organization.
For Cybersecurity Analysts:
Identify new or imminent threats before incidents happen by tracking vulnerabilities, exploits, publications by researchers and white hat hackers, and discussions on closed forums and dark web markets.
Geospatial Intelligence:
Generating geo-specific Digital Intelligence using advanced search techniques, satellite imagery analysis, and geofencing
Finding the Lone Actor:
Techniques to identify lone-actor attackers and inspired individuals online — mapping the radicalization pipeline before an attack occurs
Online Extremism and Radicalisation:
Identifying, interpreting, and monitoring extremist content across ideologies — including jihadist networks, far-right movements, and ideologically motivated lone actors. How to build a target acquisition pipeline and apply structured analytical techniques.
This course is contextualized to a specific region and threat environment. Existing syllabi and case studies cover Europe, South Asia, and Southeast Asia.
AI Literacy for Analysts:
Understanding AI-generated content, detecting synthetic personas, identifying LLM-assisted disinformation, and using AI tools responsibly within intelligence workflows
Detecting Synthetic Media and Deepfakes:
Practical techniques for identifying AI-generated images, video, and audio used in fraud, influence operations, and impersonation attacks
For Revenue Authorities:
How to scan online marketplaces, creator platforms, and gig economy services to identify undeclared income and tax-base erosion
Cryptocurrency and Blockchain Investigations:
Tracing transactions across wallets and exchanges; identifying mixing services, DeFi activity, and sanctions evasion typologies
GoldenSpear Deep Fusion User Course
Operational use of the Deep Fusion platform for investigators and analysts
GoldenSpear Deep Fusion Administrator Course
System administration, user management, and platform configuration
GoldenSpear Deep WebINT User Course
OSINT and web intelligence collection using the Deep WebINT platform
GoldenSpear Robot Studio Training
Create and deploy custom collection robots for websites, forums, social media, and dark web sources
GoldenSpear Studio
Creating, managing, and operating digital identities for active collection
GoldenSpear Data Ingestion for Data Analysts
Building ingestion workflows to connect proprietary and third-party data sources
GoldenSpear AutoML
Configuring AI and machine learning models for predictive analysis and threat scoring