Technical Investigation

This suite of courses are for staff who conduct internet based research but require a more technical level of knowledge to support their online activity.  Our ethos when creating this suite of courses was to encourage operators to lose their reliance on OSINT platform tools that can loose access to data feeds, provide incorrect information or just limit the data available.  Attendance on these courses will provide learners with the knowledge to operate in a self sufficient manner in Advanced discreet digital investigations.

Linux 101

This course for delegates who are new to the Linux operating system but wish to attend technical investigation courses. This training equips learners with the skills to operate a Linux OS.  Our technical courses utilise Linux operating systems so if you are embarking on a sorinteq technical course and feel you may need a quick top up on the linux skills, this is the course for you.  The course is virtual and on many courses is offered a free additional pre-course assist.

For more information on this course, please follow the link below to request a course flyer.

Fundamental Cyber recon

This cyber reconnaissance or cyber recon course is designed for experienced OSINT practitioners who wish to enhance their skills and start to look at other tools and techniques to do this.  Our fundamental course introduces the learner to code based tools to enhance and automate some search techniques for various platforms.  The course provides leaners with a virtual learning Linux learning environment that students continue to have access to post their course.  The skills taught are Linux based and can be utilised operationally with very little effort. 

For more information on this course, please follow the link below to request a course flyer.

Intermediate Cyber recon

This cyber reconnaissance or cyber recon course is designed for experienced OSINT practitioners who are proficient in the use of coded tools and who wish to enhance their skills and start to look at other tools and techniques to do this.  The course looks closer at the python coding language and how utilising simple Python commands can greatly enhance your research by building structured commands to support your investigation techniques.  This is an advanced skill level course and is designed for learners who have an interest and experience in using code based skills in their investigations.

For more information on this course, please follow the link below to request a course flyer.

Advanced Cyber recon

This is an advanced level course for practitioners who are operating at an advanced level in the research field.  Learners are taught more advanced tools and techniques for conducting internet investigations including footprint analysis and large data analysis techniques.  This course is for experienced practitioners who have knowledge and experience in working with Linux and coding.

For more information on this course, please follow the link below to request a course flyer.

Radio Frequency, RF,
Exploitation

As we pass through the digital world we are surrounded by radio signals constantly.  With smartphone technologies, Wi-Fi, the Internet of Things and near field communication our physical selves constantly interact with the RF spectrum and frequently leave digital breadcrumbs behind.  This course looks at the various data sets that can be analysed and exploited when operators look at the RF signature left by a bad actor and how these fragments of data can be utilised to build a picture of their movements and activities. 

For more information on this course, please follow the link below to request a course flyer.

Fundamentals in hacking

This training program is a foundation knowledge course in the techniques and processes used in the art of hacking.  This course is designed for two types of delegates – staff that investigate Cyber-attacks and staff that conduct sensitive exploitation techniques against individuals, devices, and sites.  The techniques discussed and practiced offer an insight to and understanding of the various Hacking stages and techniques used by bad actors.

For more information on this course, please follow the link below to request a course flyer.

Intermediate hacking

This training program is an intermediate level course in the techniques and processes used in the art of hacking.  This course is designed for two types of delegates – staff that investigate Cyber-attacks and staff that conduct sensitive exploitation techniques against individuals, devices, and sites.  Whilst the techniques discussed and practiced during the foundation course are encountered during the recon stage of a hack, this phase looks at the techniques utilised during the access gaining and lateral movement stage of an attack. 

For more information on this course, please follow the link below to request a course flyer.

Introduction to Digital Forensics

This course is aimed specifically at those investigators and operatives who are engaged and active in digital investigations where covert Forensic recovery is an available tactic and who want to enhance the quality of data they can obtain from a user’s devices and cloud stored data.  The course offers a range of skills and techniques that can be conducted on owned or authorised devices in order to recover both intelligence and evidential opportunities. The course offers a legislative framework for consideration and the planning and execution of a digital recovery operation.

For more information on this course, please follow the link below to request a course flyer.