Location: self-paced e-learning
While general internet research appears simple, the Web can be very difficult to navigate when searching for timely, accurate, and actionable intelligence.
The complexities of the internet can produce missing information, and a user’s safety, integrity, and privacy can be compromised if they are unaware of the inherent risks that come with online research and investigation.
The most comprehensive internet research and intelligence e-learning program available, Using the Internet as an Investigative Research Tool™ equips students with the knowledge and techniques required to effectively use the internet as an Open Source Intelligence, research, and investigation tool.
Students are guided through many of the advanced search features of both popular and lesser-known search engines, and similar search portals. Learn about:
Students will be introduced to and will explore:
Building on Module 1 skills, this second module introduces the principles of open source research and the intelligence analysis process. Learn about:
While delving into online environments that may be interactive, avoid detection by anticipating pitfalls and concealing your identity with:
Piece together a “big picture” from fragmented information gleaned from “user-generated content” sites, such as:
Understand the online “footprint” that is left behind when navigating through the Web. Ensure online safety and security while while conducting online investigations, with:
Video demonstrations, case studies, and interactive practical exercises accelerate learning, along with the examination of Web server log files and temporary internet files.
Focusing on the future of the Information Age, students will explore Web 2.0-3.0 technology, and take advantage of the attitudes and practices of the new generation of internet users. Learn about:
Examine personal privacy and data security, in relation to:
Visualize digital networks (or digital fingerprints) with:
Use essential investigative aids, which provide a framework for all online investigations, including:
Students must have a computer capable of accessing:
Each student must have a basic working knowledge of: