c0c0n is a 19 years old platform that is aimed at providing opportunities to showcase, educate, understand and spread awareness on Information Security, data protection, and privacy...
Operational Open Source Intelligence (OSINT), From Online Data to Real-World Impact.
Operational Open Source Intelligence (OSINT), From Online Data to Real-World Impact.
c0c0n 3-Day Professional Training
Operational Open Source Intelligence (OSINT), From Online Data to Real-World Impact.
Objective
To provide delegates with a comprehensive, practical understanding of how to collect, analyse, and apply open source intelligence in real-world scenarios
To demonstrate how publicly available data can be leveraged by both defenders and adversaries
To develop structured intelligence thinking aligned with real investigative workflows
To equip participants with the skills to identify individuals, assets, locations, and digital footprints using open sources
To bridge the gap between online intelligence and physical world impact, including targeting, fraud, and insider threat risks
To introduce operational security principles to safely conduct investigations without exposure
To provide hands-on, real-world techniques used by law enforcement, intelligence agencies, and private sector investigators
Course Content
Day 1 – Foundations of OSINT & Intelligence Thinking
Understanding how the Internet works and why it matters for investigations
Intelligence vs information, grading, validation, and structured analysis
Introduction to social media intelligence and regional platform differences
Building effective search strategies and investigative workflows
Introduction to digital footprinting and exposure risks
Day 2 – Advanced Collection & Analysis Techniques
Geolocation intelligence, identifying locations from images and content
Image and video analysis, reverse image searching, metadata exploitation
Public records and global databases for investigative use
Identifying individuals through usernames, emails, and phone numbers
Investigating online marketplaces and tracking illicit activity
Day 3 – Operational Application & Real-World Scenarios
Operational security (OPSEC), anonymity, and safe investigative practices
Introduction to dark web intelligence and threat environments
Linking online intelligence to real-world targeting and threats
Insider threat and human vulnerability in modern cyber environments
Practical exercises and live investigative scenarios
Case studies from law enforcement and intelligence operations
Pre-requisite
No prior OSINT experience required
Basic understanding of the Internet and common platforms is beneficial
Participant's Requirements
Laptop (Windows or Mac)
Internet browser (Chrome recommended)
Ability to install/open web-based tools
Optional accounts for selected platforms (guidance provided during session)
Notebook for capturing intelligence and methodology
Who Should Attend
Law enforcement and investigative agencies
Intelligence and defence personnel
Cybersecurity professionals
Corporate security and risk teams
Fraud investigators and analysts
Journalists and researchers
Anyone responsible for intelligence gathering or threat identification
What to expect
Hands-on, practical OSINT training
Real-world techniques used by global intelligence professionals
Live demonstrations and guided exercises
Clear, structured methodology for investigations
Engaging delivery combining cyber and human intelligence perspectives
Exposure to tools, techniques, and investigative mindset used globally
What Not to Expect
Purely theoretical or academic content
Overly technical or coding-heavy sessions
One-size-fits-all tool lists without context
Passive learning, this is an interactive and practical workshop