Training

Taking investigators where
they need to go.

The success of investigations can pivot on collecting from quality data sources, implementing proper methodology, and honing investigative skill. The good news is that these skills can be learned and applied to OSINT investigations and beyond.

Make the most of your investigations with ShadowDragon training.

TrainingOverview
Play Video

Having the right tools is important, but knowing how to use them effectively can take your investigation further than they have ever gone before.

SHADOWDRAGON® PROVIDES SOLUTIONS THAT
POWER UP YOUR INVESTIGATIONS

SHADOWDRAGON® PROVIDES SOLUTIONS THAT POWER UP YOUR INVESTIGATIONS

icon documents

Learn investigative techniques that are not product dependent.

icon focus

Expand investigations in meaningful directions.

icon process

Develop advanced workflows that apply to your needs.

icon puzzle red

Test newly gained knowledge with practical exercises and review.

GettyImages-1022150556

Courses

We believe in enabling our clients to get the highest value possible from the investment in our tools.

All courses are designed to help you stay relevant in the field of cyber security. Customize your training with add-on modules for your specific use cases. Add-on modules enhance core training programs with advanced topics and OSINT-specific knowledge.

All software is demonstrated on the Horizon® platform. Classes are online, virtual, instructor-led presentations unless otherwise noted.

SHADOWDRAGON CORE TRAINING MODULES

SocialNet®

Socialnet Foundations
Free, Self-Paced, COMPUTER-BASED, ON-DEMAND

Access • Configuration • Network Sources • UI Overview and Features • Common Playbooks
Show details
This course is designed for new users of SocialNet within the Maltego platform, providing an in-depth review of tools an analyst would use from start to finish during an investigation including the most used start points and recommended workflows for research and investigations.

Check with Sales Rep if eligible for SocialNet Foundations+ upgrade
Hide details
Socialnet Foundations +
2 Hours

Includes SocialNet Foundations Curriculum • Playbooks • 1-2 Use Cases • Access to On-Demand Course
Show details
This course begins with SocialNet Foundations basics, then moves into practical applications and use cases following instructor-recommended workflows and an introduction to the automated playbook feature. Also includes access to the on-demand, self-paced course.

Hide details
Socialnet Advanced
4 Hours

Includes SocialNet Foundations • Alternative Workflows • Advanced Workflows, Techniques • 1-2 Intermediate CTF Exercises
Show details
This course is for skilled analysts and investigators, who have experience, to conduct research to learn through practical use, get familiarized with more advanced tools, and perform Capture The Flag (CTF) exercises to sharpen skills.

Hide details
Socialnet Advanced +
6 Hours

Includes SocialNet Foundations & SocialNet Advanced • Advanced Methodologies • 3-4 Advanced CTF Exercises
Show details
This in-depth course explores advanced OSINT methodology, follows workflows with varying start points, expands knowledge on publicly available data sources, and reviews additional resources to use with SocialNet, while testing skills with variable skilled CTF exercises.

Hide details

Other Products

Horizon Monitor Foundations
Monitoring 101; 3 hours

Horizon Monitor Basics/Alerts/Project Setup • Activity Monitoring • Methodology • Customer Use-Case Specifics
Show details
This course introduces using OIMonitor within Horizon to set up targeted alerts and investigate subjects by configuring data sources, effectively tracking alerts and subjects through various monitoring themes, and investigating targets of interest through practical use cases.

Hide details
Malnet
ON-DEMAND; 30 minutes

Incident Response Investigation • Pivot on Source IP Address, DNS, or Domains • Related IDS Signatures & Malware Samples
Show details
This session offers on-demand investigative support for responding to an incident. Access and deploy MalNet with an instructor to gain critical information related to a rapid investigation that could involve tracking source IP addresses, DNS, or domains, identifying related IDS signatures, and comparing previously known malware samples.

Hide details

SHADOWDRAGON ADD-ON TRAINING MODULES

Osint 101
For All Investigators;
1 hour

What is OSINT and Publicly Available Information • OSINT Fundamentals • Likely Sources of OSINT • OSINT Resources/Bookmarks
Show details
This session covers the emergence of open source intelligence (OSINT) for investigations starting with the fundamentals, the importance of staying within the boundaries of Publicly Available Information (PAI), accessing resources, utilizing bookmarks, and the extent of data collection capabilities presented by ShadowDragon.

Hide details
Critical Thinking 101
For All Investigators;
1 hour

Critical Thinking in OSINT • Analyze • Evaluate • Make Informed Decisions • Assumptions • Interpreting Data • Alternatives • Draft Research Questions
Show details
This course reveals how to analyze and evaluate OSINT information to obtain the most effective results through questioning assumptions, objectively interpreting data, validating information, applying alternative perspectives, drafting good research questions, and pivoting on new discoveries.

Hide details
Regular Expressions 101
Most useful for Horizon Monitor
Users; 1 hour

REGEX Basics; Build REGEX (Lucene) for Horizon Monitor Projects • Practical Application
Show details
This session teaches how to build regular expressions (REGEX) in Lucene primarily in support of setting up effective alerts within OIMonitor. Learn how to create a sequence of characters that specifies a text match pattern prioritized by string-search algorithms.

Hide details
Cyber Signature Awareness
OPSEC, FOR ALL INVESTIGATORS; 1.5 HOURS

Basics • Fingerprinting • Hiding • Good Operational Security • Managing Attribution • Practical Application
Show details
This course is about practicing good operational security while conducting digital investigations. It teaches how to implement and recognize techniques with regard to basic digital fingerprinting and how to properly manage attribution. Knowledge and retention tested through practical applications.

Hide details
Understanding Google for OSINT
FOR ALL INVESTIGATORS;
2 HOURS

Google Fundamentals • Google Operators • Search Queries & Filters • Google Cache • Using Search Results in SocialNet/Horizon Monitor • Practical Application
Show details
This session teaches what Google is and what it is not, how to build effective search queries using Google operators, custom Google searches, filtered Google results, and how to use search breadcrumbs to pivot in SocialNet and OIMonitor, with practical examples.

Hide details

SHADOWDRAGON ADD-ON TRAINING MODULES

Osint 101
For All Investigators;
1 hour

What is OSINT and Publicly Available Information • OSINT Fundamentals • Likely Sources of OSINT • OSINT Resources/Bookmarks
Show details
This session covers the emergence of open source intelligence (OSINT) for investigations starting with the fundamentals, the importance of staying within the boundaries of Publicly Available Information (PAI), accessing resources, utilizing bookmarks, and the extent of data collection capabilities presented by ShadowDragon.

Hide details
Critical Thinking 101
For All Investigators;
1 hour

Critical Thinking in OSINT • Analyze • Evaluate • Make Informed Decisions • Assumptions • Interpreting Data • Alternatives • Draft Research Questions
Show details
This course reveals how to analyze and evaluate OSINT information to obtain the most effective results through questioning assumptions, objectively interpreting data, validating information, applying alternative perspectives, drafting good research questions, and pivoting on new discoveries.

Hide details
Regular Expressions 101
Most useful for Horizon Monitor
Users; 1 hour

REGEX Basics; Build REGEX (Lucene) for Horizon Monitor Projects • Practical Application
Show details
This session teaches how to build regular expressions (REGEX) in Lucene primarily in support of setting up effective alerts within OIMonitor. Learn how to create a sequence of characters that specifies a text match pattern prioritized by string-search algorithms.

Hide details
Cyber Signature Awareness
OPSEC, FOR ALL INVESTIGATORS; 1.5 HOURS

Basics • Fingerprinting • Hiding • Good Operational Security • Managing Attribution • Practical Application
Show details
This course is about practicing good operational security while conducting digital investigations. It teaches how to implement and recognize techniques with regard to basic digital fingerprinting and how to properly manage attribution. Knowledge and retention tested through practical applications.

Hide details
Understanding Google for OSINT
FOR ALL INVESTIGATORS;
2 HOURS

Google Fundamentals • Google Operators • Search Queries & Filters • Google Cache • Using Search Results in SocialNet/Horizon Monitor • Practical Application
Show details
This session teaches what Google is and what it is not, how to build effective search queries using Google operators, custom Google searches, filtered Google results, and how to use search breadcrumbs to pivot in SocialNet and OIMonitor, with practical examples.

Hide details

Explore more

side-desk-725x

How OSINT Works

Open-source intelligence (OSINT) utilizes publicly available data to uncover actionable insights for threat detection, trend analysis, and decision-making. From social media monitoring to analyzing public records, OSINT supports cybersecurity, law enforcement, and competitive business strategies through structured data collection, analysis, and reporting.

dark prism data wave

What Are the Common Struggles of OSINT Investigations?

Conducting OSINT investigations can be challenging, with issues like information overload, data quality verification, technical skills, legal considerations, and misinformation. Overcoming these hurdles requires the right tools, methodologies, and expertise to streamline efforts and ensure actionable insights.

SOAA_PowerOfOSINT_2024_JAR35860

Navigating the Gray Zone: The Role of Open-Source Intelligence in Modern Conflict

Navigating the evolving gray zone of modern conflict, this post highlights the growing importance of open-source intelligence (OSINT) in addressing global threats, leveraging publicly available data, and adapting to irregular battlefields to protect security and ensure resilience.

Training CTA Callout

Learn more about
ShadowDragon Training Modules

Our training courses are designed around your needs. Whether you want to learn more about investigative methodology, advanced product usage, or real-world scenarios, our specialists are here to help you. Self-paced, virtual, or in-person options are available.

See what we can do to take your investigations where they need to go.

Scroll to Top