WHO • WHAT • WHERE • WHY

SILEX IS AWARE THAT ORGANIZATION,
LIKE YOURS, MAY LACK THE RESOURCES

REQUIRED IN DEALING WITH THREAT INTELLIGENCE

FOR OVER 5 YEARS WE
DELIVER EFFECTIVE AND EFFICIENT RESULT

IN EXPLOITING THE INTERNET AS AN INTELLIGENCE & INVESTIGATIVE TOOL

SEE PORTFOLIO
PREV
NEXT

WE UNDERSTAND THE ROLE & VALUE OF CYBER INTELLIGENCE RELATIVE TO ONLINE TARGETING & COLLECTION IN MODERN DAY SPY BUSINESS

Finding deep & hidden data that return key intelligence while remaining within the law and privacy consideration is a skill needed for the law enforcement, intelligence .

OUR TRAINING SERVICES

Cyber Intelligence & Online Investigations

Acquiring useful and relevant Open Source Intelligence (OSINT) requires much more than just an ability to surf the Web. Many valuable sources of intelligence are unknown and untapped by investigators who simply “don’t know what they don’t know” about finding information online. From routine investigations conducted by frontline personnel to global, tactical, and strategic OSINT operations, online and social media research and investigation skills are an essential requirement at all levels of organization.

  • Course Curriculum

  • Advanced Search Techniques
  • Deconstructing Web Pages to Find Hidden Information
  • Techniques for “De-Anonymizing” Internet Users
  • The “Deep Web” – Public Directories and Databases
  • Multimedia Search Tools and Techniques
  • Crowd Sourcing and the “Real-Time” Internet
  • Online Intelligence Opportunities and Threats
  • Maintaining Security and Protecting Privacy
  • Locating and Linking People, Places, and Things
  • Determining Web Site and User Locations
  • Capturing, Organizing, and Storing Web-Based Evidence
  • Automated Mapping and Monitoring of Target Websites
  • Using RSS Feeds and News Aggregators
  • Forum, Discussion Board, and Newsgroup Search
  • Evaluation and Analysis of Internet-Sourced Data
  • Strategies and Tactics for Developing a Research Plan
  • Investigating Blogs, Wikis, and Social Networking Sites
  • The “Dark Web” – Contraband in Hidden Online Criminal Marketplaces
  • Geo-Located Social Media Search and Collection Techniques
  • Introduction to Thousands of Online Tools and Resources

The Dark Net

As its name suggests, the Dark Net abounds with illegal and illicit content, and attracts the types of individuals that seek to buy, sell, and communicate with other like-minded individuals. It is also something of a safe haven for those involved in such nefarious activities as the production and distribution of child exploitation imagery, terrorism, organized crime, and murder, as well as many other types of criminal behavior and dishonorable conduct. Attendees will be exposure to creation and use of “ghost” identities, the ethics of covert investigations

  • Course Curriculum

  • TOR and the Dark Net
  • Bitcoin and Digital Currencies
  • Online Data Collection, Collation, and Storage Tools
  • Geofencing and Live Web Monitoring
  • Social Networks and Online Communication Tools
  • Practical Search Exercises

Cyber Bullying, Stalking, & Harassment

Our lives, personalities and priorities are digitally displayed in our personal, and often, public profiles, and our day-to-day activities are often broadcast and permanently intertwined in our social networks for our friends, families, coworkers and enemies to see. This continual stream of personal information, along with the immediacy of electronic communication, has facilitated a significant increase in the instances of cyber bullying, stalking and harassment in all age groups, genders and personal circumstances.

  • IP and Email tracing
  • Profiling

WE'RE WORLDWIDE

Finding the right information & understanding how to interpret it is essential in business whether it is competitive intelligence, enhanced due diligence, getting background screening or any other of the myriad of information focused business functions.

INSTANT RESULTS

If you don’t measure, how do you know if you are being successful? What valuable data did you collect in the process? Was it actionable? Successful training needs to be measured and provide actionable data about the strengths and weaknesses against our advisory.

CYBER INVESTIGATION TRAINING & FOCUS ON

There isn’t much of what happens in our daily lives which does not leave a digital footprint. To interact at all requires some form of digital communication channel. There are countless scenarios which require investigation services from industrial espionage to phishing, anonymous defamation and hidden competitor attacks. Regardless of what the circumstance it is essential that a corporation or individual gets to the bottom of Determining the above will then lead to actionable, admissible evidence with solutions for neutralisation of the threat.

OUR

EXPERIENCE

  • We are well-experienced and well-equipped to handle any type of cyber investigation. We can deploy technology and proven investigative methodologies to uncover who, what, where, and why it is happening. We will investigate each case carefully and thoroughly, with proven solutions, to uncover the evidence that is necessary for the resolution of your problem. However, we are very honest with our clients in terms of what is doable and what is not doable.

our working process

planning & strategy

Using the Internet as an Investigative Research Tool equips students with the knowledge and techniques required to effectively use the Internet for Intelligence, & investigation

design & develop

This course provides a rich and interesting opportunity to explore the key concepts and intellectual foundations which inform intelligence analysis activity

test & deliver

Continually promote empowered resources required to locate, identify and monitor individuals of interest, gather and retain Internet-sourced digital evidence.

WHAT OUR STUDENT ARE SAYING

The Training was very interesting & mind blowing. Why ? Because it open my eyes to the world of information security & many things than can be done through it.

Arreytambe Tabot

AUST
I learnt a lot from the training, would be glad if a help line could be established for people to call and ask question

Aniebiet-Abasi Udo

Student

Agbokutaye Oghenerukevwe Maureen

I.T Department
The need for cyber security cannot be over emphasized. Silex Secure speakers are friendly and are ready to assist, encourage you build up your knowledge..

STAY TUNED!

We’ll do our best to deliver valuable updates and lots of great resources without invading your mailbox.

TOP