OSINT Techniques for Data Retrieval and Analysis
Build hardened, court-defensible OSINT infrastructure with strong attribution and OPSEC
This workshop prepares participants for real-world cases where adversaries use cloud infrastructure, synthetic media, and coordinated networks to hide intent and identity. Participants will learn how to legally extract, verify, analyse, and present digital intelligence that stands up to operational scrutiny and court requirements.
Email hello@q8asia.com.sg to ask for a course brochure or about course fees.
Build hardened, court-defensible OSINT infrastructure with strong attribution and OPSEC
This workshop prepares participants for real-world cases where adversaries use cloud infrastructure, synthetic media, and coordinated networks to hide intent and identity. Participants will learn how to legally extract, verify, analyse, and present digital intelligence that stands up to operational scrutiny and court requirements.
Email hello@q8asia.com.sg to ask for a course brochure or about course fees.
Good to know
Highlights
- 1 day 8 hours
- To be announced
Refund Policy
Location
To be announced