SEC587: OnDemand

Provided by

What You Will Learn

SANS SEC587 is an advanced Open-Source Intelligence (OSINT) course for those who already know the foundations of OSINT. The goal is to provide students with more in-depth and technical OSINT knowledge. Students will learn OSINT skills and techniques that law enforcement, intelligence analysts, private investigators, journalists, penetration testers and network defenders use in their investigations.

Open-source intelligence collection and analysis techniques are increasingly useful in a world where more and more information is added to the internet every day. With billions of internet users sharing information on themselves, their organizations, and people and events they have knowledge of, the internet is a resource-rich environment for intelligence collection. SEC587 is designed to teach you how to efficiently utilize this wealth of information for your own investigations.

SEC587 will take your OSINT collection and analysis abilities to the next level, whether you are involved in intelligence analysis, criminal and fraud investigations, or just curious about how to find out more about anything! SEC587 is replete with hands-on exercises, real-world scenarios, and interaction with live internet and dark web data sources.

This course is also blended with all the fundamentals an OSINT analyst will need to learn and understand and apply basic coding in languages such as Python, JSON, and shell utilities as well as interacting with APIs for automating your OSINT processes.
Skills Learned
  • Debug, understand, alter, and create your own OSINT-focused Python scripts
  • Move and pivot around safely on the Dark Web
  • Perform financial OSINT investigations
Syllabus Summary
  • Section 1: Disinformation and Coding for OSINT Efficiency
  • Section 2: Intelligence Analysis and Data Analysis with Python
  • Section 3: Sensitive Group Investigations, Video and Image Verification, and Artificial Intelligence for OSINT
  • Section 4: Sock Puppets, OPSEC, Dark Web and Cryptocurrency
  • Section 5: Automated Monitoring, Vehicle Tracking, and Dealing with Password-Protected Files
  • Section 6: Capstone
What You Will Receive

Physical and digital workbooks and a course specific Virtual Machine (VM) tailored for this Advanced Open Source Intelligence Gathering and Analysis course

Related article

At GIAC, we believe that hands-on testing is the future of cybersecurity certification. With five certification exams featuring CyberLive , and thr...