{"id":15271,"date":"2024-05-21T17:33:50","date_gmt":"2024-05-21T16:33:50","guid":{"rendered":"https:\/\/www.sharinguniversity.eu\/wpress\/?page_id=15271"},"modified":"2024-10-08T19:23:05","modified_gmt":"2024-10-08T18:23:05","slug":"cyber-intelligence-and-open-source-intelligence-based-operations-osint","status":"publish","type":"page","link":"https:\/\/www.sharinguniversity.eu\/wpress\/cyber-intelligence-and-open-source-intelligence-based-operations-osint\/","title":{"rendered":"Cyber Intelligence and Open Source Intelligence Based Operations (OSINT)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15271\" class=\"elementor elementor-15271\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4438ca9 elementor-section-stretched elementor-section-height-min-height elementor-section-items-bottom elementor-section-boxed elementor-section-height-default\" data-id=\"4438ca9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-710ce73\" data-id=\"710ce73\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-960f694 elementor-widget thim-ekits-heading elementor-widget-thim-heading\" data-id=\"960f694\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sc_heading \"><h2 class=\"title\">Cursos <\/h2><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1038632 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1038632\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-03af767\" data-id=\"03af767\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd74e34 elementor-widget thim-ekits-heading elementor-widget-thim-heading\" data-id=\"fd74e34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sc_heading \"><h4 class=\"title\"> Cyber Intelligence and Open Source Intelligence Based Operations (OSINT) <\/h4><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6dd2528 e-grid e-con-full e-con e-parent\" data-id=\"6dd2528\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9659757 elementor-widget elementor-widget-text-editor\" data-id=\"9659757\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #0000ff;\"><strong>Value:<\/strong><\/span>\u00a0 2600 \u20ac<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49c4e36 elementor-widget elementor-widget-text-editor\" data-id=\"49c4e36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #0000ff;\">Timetable:<\/span><\/strong><\/p>\n<p>Monday, Wendsday and Thrusday from 18:00 H to 22:00 H<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2576f1f elementor-widget elementor-widget-text-editor\" data-id=\"2576f1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #0000ff;\"><strong>Format:<\/strong><\/span> Online<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-932f3bf elementor-widget elementor-widget-text-editor\" data-id=\"932f3bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span style=\"color: #0000ff;\">N. Hours:<\/span><\/strong> 60 H<\/p><p>Duration: 8 weeks<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-060984c elementor-widget elementor-widget-spacer\" data-id=\"060984c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1d0939 elementor-widget__width-auto elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"b1d0939\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tTraining Type\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4174ff elementor-widget elementor-widget-text-editor\" data-id=\"c4174ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>B-Learning<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10267cc elementor-widget__width-auto elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"10267cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tGeneral Goals\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7233a4 elementor-widget elementor-widget-text-editor\" data-id=\"e7233a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>In the end of the course, the students should be able to:<\/strong><\/p><ul><li>Develop a comprehensive understanding of intelligence operations and their role in contemporary security challenges.<\/li><li>Acquire knowledge and skills in utilizing OSINT tools, techniques, and methodologies for intelligence gathering.<\/li><li>Comprehend the ethical and legal considerations associated with OSINT and intelligence operations.<\/li><li>Analyze and evaluate geopolitical factors and deterrence strategies relevant to intelligence operations.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6241e22 elementor-widget__width-auto elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"6241e22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-chevron-circle-right\"><\/i>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tSpecific Goals\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a07a43f elementor-widget elementor-widget-text-editor\" data-id=\"a07a43f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>In the end of the course, the students should be able to:<\/strong><\/p><ul><li>Gain insights into the cyber threat landscape and the integration of OSINT in cyber warfare.<\/li><li>Apply advanced OSINT techniques for social media intelligence, web scraping, dark web investigations, and analytical methods.<\/li><li>Learn intelligence fusion approaches, collaboration, and effective reporting of intelligence findings.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3c63165\" data-id=\"3c63165\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f1c70ae elementor-widget thim-ekits-heading elementor-widget-thim-heading\" data-id=\"f1c70ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sc_heading \"><h4 class=\"title\">Documenta\u00e7\u00e3o <\/h4><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5620c2 elementor-widget elementor-widget-image\" data-id=\"f5620c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.sharinguniversity.eu\/wpress\/download\/program-cyber-intelligence-and-open-source-intelligence.pdf\" target=\"_blank\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1080\" height=\"1080\" src=\"https:\/\/www.sharinguniversity.eu\/wpress\/wp-content\/uploads\/2024\/05\/download-programa-de-formacao-2.jpg\" class=\"attachment-full size-full wp-image-15203\" alt=\"\" srcset=\"https:\/\/www.sharinguniversity.eu\/wpress\/wp-content\/uploads\/2024\/05\/download-programa-de-formacao-2.jpg 1080w, https:\/\/www.sharinguniversity.eu\/wpress\/wp-content\/uploads\/2024\/05\/download-programa-de-formacao-2-300x300.jpg 300w, https:\/\/www.sharinguniversity.eu\/wpress\/wp-content\/uploads\/2024\/05\/download-programa-de-formacao-2-1024x1024.jpg 1024w, https:\/\/www.sharinguniversity.eu\/wpress\/wp-content\/uploads\/2024\/05\/download-programa-de-formacao-2-150x150.jpg 150w, https:\/\/www.sharinguniversity.eu\/wpress\/wp-content\/uploads\/2024\/05\/download-programa-de-formacao-2-768x768.jpg 768w\" sizes=\"(max-width: 1080px) 100vw, 1080px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c57e710 elementor-widget elementor-widget-spacer\" data-id=\"c57e710\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aafb248 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"aafb248\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e2d649 e-flex e-con-boxed e-con e-parent\" data-id=\"9e2d649\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a058750 elementor-widget elementor-widget-heading\" data-id=\"a058750\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Para mais informa\u00e7\u00f5es,\n contacte-nos:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cursos Cyber Intelligence and Open Source Intelligence Based Operations (OSINT) Value:\u00a0 2600 \u20ac Timetable: Monday, Wendsday and Thrusday from 18:00 H to 22:00 H Format: Online N. Hours: 60 H Duration: 8 weeks Training Type B-Learning General Goals In the &hellip; <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-15271","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/pages\/15271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/comments?post=15271"}],"version-history":[{"count":25,"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/pages\/15271\/revisions"}],"predecessor-version":[{"id":16200,"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/pages\/15271\/revisions\/16200"}],"wp:attachment":[{"href":"https:\/\/www.sharinguniversity.eu\/wpress\/wp-json\/wp\/v2\/media?parent=15271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}