CYBV354 Principles of Open Source Intelligence


 

Course Description

CYBV354 will provide students with an overview of the fundamentals of Open Source Intelligence. Students will be presented with the most effective methodologies used by cyber professionals, law enforcement, and other investigative personnel to locate and analyze information on the Internet and Dark Web. Students will use interactive exercises to become familiar with the volume of sensitive data on the Internet and how it can be exploited to develop highly detailed intelligence products.

Learning Outcomes

Upon completion of this course students will be able to:

  • Understand and describe the goals, capabilities, and limitations associated with Open Source Intelligence
  • Examine and evaluate the different types of files that contain useful metadata as well as how to access, modify and delete metadata
  • Examine and evaluate how to use web-based and proprietary open source search tools to conduct investigations
  • Examine and evaluate the different image and video formats and how data can be embedded or hidden within the format
  • Examine and evaluate how to conduct reverse image searches to identify the origin, modifications, and geolocation data associated with an image or video
  • Examine and evaluate how to conduct Social Media research to obtain and leverage sensitive personal data during an investigationUnderstand how to identify forensic artifacts left by attacks.
  • Examine and evaluate how to find the geolocation of an WiFi access point or a subject’s IP address using Internet search tools
  • Examine and evaluate how to locate and leverage government documentation to verify and validate information about a subject

Course Objectives

During this course students will:

  • Analyze the accuracy of the publicly available data in order to validate source reliability
  • Access and analyze metadata contained within a set of provided evidence files to determine who created and modified the files
  • Investigate how much open source information can be gathered on a subject; explore the inconsistencies in the amount and types of data gathered from different sources; and examine how different sources can provide contradictory information.
  • Use common search engines to locate and analyze government data to confirm or deny the validity of data located on online community sites
  • Leverage online mapping applications to locate and plot both IP addresses and WiFi Access Points