--> Geeks Academy

Specializing Course - Workshop CYBERSECURITY & CLOUD
OSINT & Social Engineering
REQUEST INFORMATION

Specializing Course - Workshop CYBERSECURITY & CLOUD
OSINT & Social Engineering

CYBERSECURITY & CLOUD

CYBERSECURITY & CLOUD

Specializing Course - Workshop OSINT & Social Engineering

Learn the techniques of the digital "spy" to unmask the "perfect crime" with the OSINT! Smart Education Formula!

Specializing Course - WorkshopCYBERSECURITY & CLOUDFormula Weekend

OSINT, Open Source INTelligence, is an Open Source Intelligence analysis process. It is a discipline adopted by Intelligence Agencies to carry out tactical assessments or simple statistical considerations of an operational and strategic nature. Digital invisibility is the starting point of this course: little theory and a lot of practice.


CYBERSECURITY & CLOUD: OSINT & Social Engineering

CYBERSECURITY & CLOUD

Duration: 16 hours

Job Placement

English

Where the Specializing Course - Workshop OSINT & Social Engineering will take place?

City

Promotions

Scholarships

Capacity

Dubai UAE - May 14th 2024
Al Zahra St

No promotion at the moment

Assigned

10 places available
Specializing Course - Workshop capacity: 12

Online - May 14th 2024

No promotion at the moment

Assigned

10 places available
Specializing Course - Workshop capacity: 12

Specializing Course - Workshop OSINT & Social Engineering | CYBERSECURITY & CLOUD duration Weekend

Open Source INTelligence, a discipline strictly connected to the world of Cyber Intelligence, is the collection of news that must be transformed into "knowledge" through phases of validation, confirmation and certain attribution of the so-called source of diffusion. Social engineering, on the other hand, is identified as the study of a person's individual behavior in order to grasp useful information. Basically, social engineering brings together a series of techniques aimed at inducing people to provide personal information such as passwords or banking details, or to allow access to a computer in order to secretly install malicious software.
Thanks to this workshop, you will learn the techniques to carry out surveys on the web while keeping yourself invisible, and you will acquire the necessary skills to operate as an OTC (Office Technical Consultant) and PTC (Partial Technical Consultant).

UNIT 1 | Introduction to OSINT

  • Introduction to Open Source Intelligence
  • Methods and tools to manage OSINT activities
  • The collection of evidence on the web for probatory purposes
  • Search engines: what they are and how to exploit them in OSINT
  • The Internet
  • Social networks
  • OSINT & Deep Web
  • How to retrieve information from the past
  • How to crystallize and forensically acquire online evidence

UNIT 2 | Social Engineering

  • Search Engine
  • Social Networks
  • Online Communities
  • Twitter, Images, Username
  • People Search engine

UNIT 3 | OSINT hands-on laboratory

  • OSINT analysis of multimedia files
  • Creation of bait for the identification of anonymous users
  • OSINT Tools and Services
  • OSINT on email and email addresses
  • OSINT on websites
  • Social Network Intelligence
  • OSINT on different sources
  • How to perform OSINT searches safely: anonymity and privacy
  • Introduction to anonymous networks, dark web and deep web
  • Practical applications of Open Source Intelligence

Request a one-on-one interview to learn more about each teaching unit.

The course is aimed at freelancers, and public and private employees responsible for data processing and protection within the relative structures.

At the end of the workshop, you will have acquired the necessary methodology to implement an analytical process which: evaluates the information collected from different sources; integrates relevant information into a logical package; produces a conclusion, estimate or prediction of a criminal phenomenon. This scientific approach to problem solving (analysis) provides decision-makers with meaningful and reliable knowledge to pursue and cover facts involving organized crime, extremists and terrorists.

Diploma & Certifications
At the end of the course, you will receive a certificate of completion “GEEKS ACADEMY DIPLOMA”, a “DIPLOMA SUPPLEMENT” and the EXIN INTERNATIONAL CERTIFICATIONS included in your study plan – if you choose to sit the exam, which is not mandatory.

Career Coaching 
For a period of 5 years after the conclusion of the course, you will have the chance to benefit from our Career Coaching service for free. 
Over 95% of our graduates have found a job within 3 months since the end of the course!

International Experiences
To our students we offer the possibility to take part in exciting study trips in Dubai, Seoul, Milan, Rome and Singapore, where the hubs of our international network are located. These immersive experiences represent a great way to enrich students’ wealth of knowledge and increase their career opportunities.

Global Alumni Community
By joining this course, you will automatically become a member of the AGA: the Alumni Geeks Academy.
AGA is the community that gathers all our former students in order to offer them support, help them strengthen and develop professional relationships, provide them with networking opportunities and notify them about the latest job offers. The Alumni International Day represents the community’s most important international networking event, as well as a valuable opportunity to keep up-to-date with the latest trends and technologies.

Smart Education Formula
Course delivery mode: synchronous distance learning.

The lessons will take place on Saturday and Sunday (10:00-13:00 and 13:45-15:45 CET).

*The hours indicated are intended as academic hours of 50 minutes each.

E-learning Platform
Our flexible approach allows you to study wherever and whenever you want, even if you work and do not have much time. 
All lessons are delivered OnlineLive by qualified teachers, and are recorded in real time to give you the opportunity to watch them asynchronously on our e-learning platform, in case you miss one lesson or you want to review some contents. Among other things, on the platform you will also find many useful materials for self-studying, such as self-assessment tests, exercises and exam simulations. 

Minimum hardware requirements
Notebook: 64-bitdual core on x86-64 CPU | 8GB RAM | O.S. Linux/Windows

Payment Method
Payment must be issued in one single solution before the beginning of the course.

The number of places available is limited

Please fill out the form to inquire about our services & promotions and to check the availability.

 

Request information

AND DOWNLOAD THE BROCHURE


Register with your profile:

Or fill in the fileds:

Share with:


Specializing Course - Workshop Area

CYBERSECURITY & CLOUD

CYBERSECURITY & CLOUD


By 2026, the cyber security market value will exceed $290 billion. In 2020, companies identified cyber crime as the major risk for business, while the World Economic Forum indicated it as the number 3 threat to global security. The number of profiles required will increase by 300%, due to the rise in cyber crime.

Check out also these courses of CYBERSECURITY & CLOUD

Digital training courses Geeks Academy

Blockchain: 4,9€ billion European investments by 2023

The value of the Cyber Security global market will be 300 billion in 2025.

13,4 million European Data Workers by 2028

REQUEST INFORMATION

Our Partners

powered by dunp