Beyond Google: Conducting online research or investigations
Presentation formats: Keynote, 1 hour, half day, full day, two day
Open source intelligence is simply information that can be gathered publicly. The internet holds a vast array of knowledge provided we know where and how to find it. This seminar will deliver several useful strategies to find what you are looking for online.
With the majority of the world’s population on popular social media sites, people share more information online than ever before. Learn how social media and other online communities allow us to gather evidence and other tools to bolster the investigation.
This interactive session will have course participants working with various case studies to illustrate the various resources that can be utilized to gather information.
Learn how to use online search tools and databases efficiently and effectively.
Discover online resources and how to use them
Tools to protect your identity while conducting investigations
Conduct effective online searches
Why use it?
Open source intelligence is simply information that can be gathered publicly. The internet holds a vast array of knowledge provided we know where and how to find it. This seminar will deliver several useful strategies to find what you are looking for online.
With the majority of the world’s population on popular social media sites, people share more information online than ever before. Learn how social media and other online communities allow us to gather evidence and other tools to bolster the investigation.
This interactive session will have course participants working with various case studies to illustrate the various resources that can be utilized to gather information.
Learn how to use online search tools and databases efficiently and effectively.
Discover online resources and how to use them
Tools to protect your identity while conducting investigations
Conduct effective online searches
Why use it?
- To know what people and organizations may be saying about you
- Reputation management
- Threat Assessment: Corporate and personal
- Brand Protection