The "Financial Crime Investigations and Fundamentals of Open Source Intelligence - OSINT" course is designed to equip you with the knowledge and skills needed to conduct a successful financial crime and fraud investigation, as well as the basics to effectively gather and analyze Open Source Intelligence also known as OSINT.
In the first part of the course, you will be introduced to the criminal intelligence process and all its stages. You will learn analysis techniques, how to develop premises and inferences, and how to present the results in different forms.
In the second part, you will learn how to prepare the tech environment for research and use the tools needed to conduct a secure and safe investigation. You'll explore the basic fundamentals of virtual machines - VMs, VPNs, DNS records, exif data, the dark web, virtual currencies / cryptocurrencies, and much more.
To assess your knowledge, the course includes small questionnaires for some of the sections.
Besides Udemy's certificate, we additionally offer a Personalized Certificate of Completion issued by The Elite Compliance Group, upon request. To obtain yours, simply send us a private message through Udemy, including the name you'd like to see on the certificate.
Please consider that due to high demand, the certificates are processed and issued at the end of each month. For instance, if you request a certificate in January, it will be provided in February.
Enroll in the course now to take your knowledge and skills to the next level and advance your career in the compliance field.
Full Course Index
Part 1: Financial Crime and Fraud Investigations
An introduction to intelligence
Information vs. Intelligence
Stages
The origins of intelligence analysis
The analyst
Criminal intelligence analysis
Intelligence analysis and organized crime
The intelligence process
What is the intelligence process?
The intelligence cycle
Direction and collection
Direction/tasking
Collection - Data gathering
Sources
Collection plan
Evaluation
Evaluation process
Evaluation tables
Collation and Analysis
Collation
Data integration and analysis
Inferences
Dissemination
Extra section - Optional articles
Sanitization
Dissemination
Axioms for an intelligence analyst
Ten standards for intelligence analysts
Basic analysis techniques
Link analysis
Inference development
Premises
Inference
Presentation of results
Oral briefings
Briefing structure
Analyze the audience
Outline your briefing
Written reports
Contents of a written report
Part 2: Open Source Intelligence | OSINT
Introduction
How OSINT fits into the intelligence cycle
Can OSINT support law enforcement?
Where does OSINT come from?
The value of OSINT for both public and private sectors
How to fight infoxication
Open sources
Preparing the environment
Virtual Machines
The browser
VPNs and More tools and tips
Research
DNS records
Archived and cached pages
Social Media
Image information
The Dark Web
Virtual Currencies
181
35
TAKE THIS COURSE