From the course: Advanced Strategic Threat Intelligence Research and Reporting
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Intelligence collection methodologies
From the course: Advanced Strategic Threat Intelligence Research and Reporting
Intelligence collection methodologies
Welcome to this video, Intelligence Collection Methodologies. How do you find what isn't meant to be found? In Threat Intelligence, collecting the right data is like piecing together a puzzle, where half the pieces are hidden. However, with the right tools and tradecraft, you can illuminate the shadows and connect dots that others miss. In this video, we'll evaluate multiple intelligence collection methodologies, Explore OSINT tools like SHODAN, VirusTotal, and Maltico. Analyze dark web monitoring integration. Examine HUMINT and SIGINT workflow integration. By the end of this video, you'll be able to identify collection methodologies, apply OSINT tools effectively, assess ethical considerations. Let's start by examining the four key intelligence collection areas. Intelligence collection methodologies. We'll break this down into four key areas of intelligence collection. OSINT, Open Source Intelligence. HUMINT, Human Intelligence. SIGINT, Signals Intelligence. Deep and Dark Web…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.