BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//The CSI Linux Pro Shop - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:The CSI Linux Pro Shop
X-ORIGINAL-URL:https://shop.csilinux.com
X-WR-CALDESC:Events for The CSI Linux Pro Shop
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Denver
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20250309T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20251102T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20260308T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20261101T080000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0700
TZOFFSETTO:-0600
TZNAME:MDT
DTSTART:20270314T090000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
DTSTART:20271107T080000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20260404T133000
DTEND;TZID=America/Denver:20260426T163000
DTSTAMP:20260411T100612
CREATED:20260329T125913Z
LAST-MODIFIED:20260330T194015Z
UID:17858-1775309400-1777221000@shop.csilinux.com
SUMMARY:ITL Event: CSI Linux OSINT Masterclass: Uncover Hidden Intelligence & Digital Footprints with Erfan Tighzan April 4th 2026
DESCRIPTION:Weekend OSINT Masterclass! \nhttps://shop.csilinux.com/shop/instructor-led-training/master-osint-with-csi-linux-live-instructor-led-training-csil-coa-certification/ \nThe CSI Linux Certified OSINT Analyst course and certification is designed to teach investigators how to collect\, preserve\, analyze\, and report publicly available information in a way that is structured\, lawful\, and operationally sound. It covers the lifecycle of an online investigation\, from foundational OSINT concepts and pre investigation preparation through anonymity\, persona development\, online collection\, domain and phone analysis\, social media\, image and video evidence\, geolocation\, tracking changes\, misinformation\, AI challenges\, cryptocurrency\, and final reporting. Its purpose is not to teach random internet searching. Its purpose is to teach how to turn open sources into actionable intelligence that can support real investigations and real decisions. \nThis course is useful because modern investigations increasingly begin online\, long before traditional evidence is collected. For law enforcement\, intelligence personnel\, private investigators\, cyber responders\, DFIR analysts\, journalists\, HR professionals\, recruiters\, researchers\, and related professionals\, the course provides a disciplined framework for identifying online leads\, preserving digital evidence\, avoiding attribution mistakes\, protecting operational security\, and converting findings into clear reporting. The certification is built around core domains such as OPSEC\, technology basics\, laws and ethics\, identification\, collection and preservation\, examination and analysis\, and reporting. \nPhase 1. Orientation\, Scope\, and Foundations of OSINT\n • Module 1. Introduction: Opens the course and frames the role of OSINT in modern investigations.\n • Module 2. About the CSIL COA: Defines the certification\, course scope\, and expectations.\n • Module 3. Pre-Training: Prepares the investigator for how to approach the course and build readiness before deeper work begins.\n • Module 4. What is OSINT?: Establishes the meaning\, value\, and limitations of open source intelligence.\n • Module 5. Examples of Online Investigation: Shows how OSINT appears in real investigative contexts and why it matters operationally. \nPhase 2. Legal\, Ethical\, and Operational Preparation\n • Module 6. Laws\, Ethics\, and OSINT: Covers legal boundaries\, ethical obligations\, and disciplined investigative conduct.\n • Module 7. Importance of Anonymity: Explains why investigator protection and source separation matter in online work.\n • Module 8. IP Addresses\, Proxies\, and VPNs: Builds technical understanding of online infrastructure\, attribution risk\, and anonymity support.\n • Module 9. Crafting Your Digital Disguise: The Art of Persona (Sock Puppet) Creation: Teaches how to create a believable investigative persona.\n • Module 10. Using your persona to investigate: Moves from persona creation to lawful and disciplined operational use. \nPhase 3. Collection\, Preservation\, and Online Source Handling\n • Module 11. Preserving Online Evidence: Covers evidence preservation\, documentation\, and defensible capture of online material.\n • Module 12. Website Collection: Focuses on collecting websites and related online artifacts in a structured manner.\n • Module 13. DNS\, Domains\, and Subdomains: Teaches how domain infrastructure supports identification\, correlation\, and online attribution.\n • Module 14. Translation options: Addresses language barriers and translation support during online investigations.\n • Module 15. Phone Numbers and Info: Covers phone based OSINT and the investigative value of telecom related identifiers.\n • Module 16. Public Records Searches: Trains investigators to incorporate public records into online intelligence work.\n \nPhase 4. Online Platforms\, Media\, and Specialized Evidence Types\n • Module 17. Social Media Sites: Covers social media as a major OSINT environment for identification\, activity mapping\, and evidence collection.\n • Module 18. The Storytelling Power of Images: Teaches image based analysis\, context extraction\, and evidentiary interpretation.\n • Module 19. Video Evidence Collection: Focuses on video acquisition\, preservation\, and analytical value.\n • Module 20. Geolocation: Covers geolocation techniques and the interpretation of location based clues.\n • Module 21. Tracking Transportation: Extends geolocation into transportation and movement analysis.\n • Module 22. Tracking changes and getting alerts: Teaches investigators how to monitor changing online targets and preserve evolving evidence. \nPhase 5. Tools\, Frameworks\, and Investigative Support Systems\n • Module 23. 3rd Party Commercial Apps: Surveys commercial OSINT tools and how they fit into disciplined investigative workflows.\n • Module 24. OSINT Frameworks (tools): Provides structured approaches to tool selection\, workflow thinking\, and investigative process support. \nPhase 6. Analytical Risk\, Emerging Challenges\, and Specialized Topics\n • Module 25. Misinformation\, Disinformation\, and Deception: Trains investigators to identify deception\, manipulation\, and false narratives in open sources.\n • Module 26. AI Challenges: Covers the role of AI in OSINT\, along with risks\, distortion\, and verification concerns.\n • Module 27. Cryptocurrency: Introduces cryptocurrency as an OSINT and investigative topic with identification and attribution relevance. \nPhase 7. Reporting\, Case Integration\, and Investigative Maturity\n • Module 28. Reporting and Actionable Intelligence: Teaches how to turn collected information into structured findings and usable intelligence.\n • Module 29. OSINT Case Studies: The True Crime Thrillers of Digital Investigations: Applies the course to realistic case based investigative scenarios.\n • Module 30. Unraveling the Intricacies of Digital Forensics: Connects OSINT work to broader forensic and investigative practice.\n • Module 31. Practicing OSINT and Resources: Reinforces continued practice\, investigator growth\, and ongoing resource development. \n— \nMeet Your Instructor: Erfan Tighzan \nErfan Tighzan brings a rare combination of lived operational awareness\, technical depth\, and intelligence driven thinking to the CSI Linux OSINT Masterclass: Uncover Hidden Intelligence & Digital Footprints. With roots in aerospace engineering and a career path shaped by real world upheaval\, Erfan transitioned into intelligence analysis\, cyber threat work\, and penetration testing with a focus on the Middle East and the complex realities of modern conflict\, security\, and digital exposure. His work draws from OSINT\, GEOINT\, SIGINT\, SOCINT\, SDR analysis\, ADS-B tracking\, HFGCS monitoring\, and operational security practices forged not as abstract theory\, but as practical necessity. He is also a published author and co-author of The Grand Manifesto of OSINT\, a CSI Linux linked handbook dedicated to lawful\, ethical\, and disciplined intelligence practice. \nIn this masterclass\, Erfan teaches OSINT the way it is meant to be practiced: not as casual internet searching\, but as a disciplined craft of collecting\, validating\, preserving\, and interpreting digital traces that others overlook. His instruction is shaped by a blend of technical skill\, geopolitical understanding\, and a relentless respect for OPSEC\, deception awareness\, and evidentiary discipline. That perspective aligns closely with the themes reflected in The Grand Manifesto of OSINT\, which covers anonymity\, preserving online evidence\, domains\, personas\, imagery\, transportation tracking\, cryptocurrency\, AI\, deception\, and case driven investigative thinking. For investigators\, analysts\, journalists\, and security professionals\, Erfan brings a teaching style grounded in reality\, shaped by pressure\, and focused on turning scattered online fragments into meaningful\, actionable intelligence.
URL:https://shop.csilinux.com/training/csi-linux-osint-masterclass-uncover-hidden-intelligence-and-digital-footprints-with-erfan-tighzan-april-4th-2026/
LOCATION:ITL CSIL-COA\, United States
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://shop.csilinux.com/wp-content/uploads/2026/03/Erfan-2.png
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Denver:20260411T133000
DTEND;TZID=America/Denver:20260510T163000
DTSTAMP:20260411T100612
CREATED:20260330T033127Z
LAST-MODIFIED:20260330T043540Z
UID:18045-1775914200-1778430600@shop.csilinux.com
SUMMARY:CSI Linux SOCMINT Masterclass: Uncover Social Media Intelligence & Digital Identities with Puria Mehmandar – April 11th\, 2026
DESCRIPTION:Weekend SOCMINT Masterclass!\nhttps://shop.csilinux.com/shop/instructor-led-training/ \nThe CSI Linux Certified Social Media Intelligence Analyst (CSIL-CSMI) course and certification is designed to teach investigators how to collect\, analyze\, correlate\, and report intelligence derived specifically from social media environments in a structured\, lawful\, and operationally sound manner. It covers the lifecycle of a SOCMINT investigation\, from foundational concepts and investigative preparation through legal and ethical constraints\, anonymity\, persona development\, identity tracing\, media exploitation\, platform-based investigations\, niche communities\, automation tools\, and final reporting. \nIts purpose is not to teach casual social media browsing. Its purpose is to teach how to extract\, validate\, and connect digital traces across platforms to produce actionable intelligence that supports real investigations and real decisions. \nThis course is useful because modern investigations increasingly unfold across social platforms\, where identities\, networks\, and intent are exposed in fragmented and fast-moving ways. For law enforcement\, intelligence personnel\, private investigators\, cybersecurity professionals\, analysts\, journalists\, and researchers\, the course provides a disciplined framework for identifying individuals\, tracking behavior\, preserving digital evidence\, navigating platform restrictions\, avoiding attribution mistakes\, and converting findings into structured intelligence outputs. The certification is built around core domains such as investigative workflow\, legal and ethical compliance\, anonymity and OPSEC\, persona operations\, evidence collection and preservation\, media analysis\, platform exploitation\, tool integration\, and reporting. \nCourse Phases and Modules \nPhase 1. Orientation\, Scope\, and Foundations of SOCMINT• Introduction: Opens the course and frames the role of social media intelligence in modern investigations• About the CSIL-CSMI: Defines certification scope\, objectives\, and expected outcomes• Base Process of Investigations: Establishes structured investigative workflows aligned with ISO/NIST standards• Examples of SOCMINT Investigations: Demonstrates real-world investigative cases and pattern-of-life analysis \nPhase 2. Legal\, Ethical\, and Operational Preparation• Laws\, Ethics\, and SOCMINT: Covers legal frameworks\, cyber laws\, and investigator conduct• Terms of Service Challenges: Explains platform restrictions\, compliance risks\, and operational limitations• Importance of Anonymity: Focuses on attack surface reduction\, browser leaks\, and investigator protection \nPhase 3. Persona Development and Identity Operations• Setting up an Online Persona (Sock Puppet): Teaches controlled identity creation and account management• Using Your Persona to Investigate: Moves from creation to active deployment in investigations• Username Search Techniques: Covers cross-platform identity tracing and correlation methods \nPhase 4. Evidence Collection\, Preservation\, and Forensics• Preserving Online Evidence: Covers defensible capture\, authentication\, and legal admissibility• Investigation Frameworks and Evidence Handling: Applies models like IIF\, ISO 27037\, and NIST 800-86• Email and Web Evidence Forensics: Introduces forensic techniques for online artifacts \nPhase 5. Media Exploitation and Content Analysis• Online Investigations with Images: Covers reverse image search and visual intelligence extraction• Video Evidence Collection: Focuses on acquisition\, preservation\, and analytical use of video \nPhase 6. Social Media Platforms and Digital Environments• YouTube Investigations: Covers video sourcing\, downloading\, and metadata awareness• TikTok Investigations: Focuses on influencer tracking\, discovery\, and rapid OSINT workflows• Facebook Investigations: Covers account analysis\, search techniques\, and privacy considerations• Telegram Investigations: Explores channel monitoring\, groups\, and encrypted ecosystems• LinkedIn Investigations: Focuses on professional profiling and network intelligence• X (Twitter) Investigations: Covers account authenticity\, bot detection\, and behavioral indicators• Instagram and Cross-Platform Analysis: Expands into multi-platform identity tracking \nPhase 7. Niche Platforms\, Communities\, and Threat Environments• Dating Sites Investigations: Covers identity tracing in niche platforms and breach data usage• Marketplace Scams: Focuses on fraud detection in online marketplaces• 4Chan and Image Boards: Explores anonymous environments and high-noise intelligence spaces• Reddit Investigations: Covers community-based intelligence gathering• Other Social Media Sites: Includes GitHub\, Mastodon\, and fringe platforms \nPhase 8. Tools\, Automation\, and Investigative Support Systems• 3rd Party Commercial Apps: Covers tools like Maltego\, Hunchly\, and link analysis workflows• Platform-Specific OSINT Tools: Introduces specialized tools for social media exploitation \nPhase 9. Reporting\, Case Integration\, and Operational Output• Writing the Report: Teaches structured reporting\, case management\, and intelligence presentation• Case Studies: Applies full investigative workflows to realistic scenarios \nPhase 10. Practice\, Resources\, and Continued Development• Practicing OSINT and Resources: Reinforces skill-building\, tool familiarity\, and continuous learning• Course Completion and Certification Path: Finalization\, feedback\, and certification readiness \n— \nMeet Your Instructor: Puria Mehmandar \nPuria Mehmandar brings a structured\, analytical\, and operational mindset to the CSI Linux SOCMINT Masterclass: Social Media Intelligence & Digital Investigations. With a professional background rooted in project execution\, procurement strategy\, and risk analysis\, he has developed a strong foundation in identifying patterns\, validating sources\, and assessing credibility within complex systems. \nAlongside his operational career\, Puria has actively specialized in open-source intelligence and digital investigation\, with a particular focus on social media environments\, identity tracing\, and cross-platform analysis. His work emphasizes the disciplined collection and synthesis of open-source data\, leveraging multilingual capabilities and cross-cultural awareness to interpret digital behavior across different regions and ecosystems. \nHe holds advanced academic training in Information Technology and History\, allowing him to bridge technical analysis with contextual and behavioral understanding. This combination enables him to approach SOCMINT not just as data collection\, but as a method of reconstructing human activity\, intent\, and networks through digital footprints. \nIn this masterclass\, Puria teaches SOCMINT as a structured investigative discipline. His approach focuses on building reliable workflows\, maintaining operational security\, respecting legal boundaries\, and transforming scattered social media data into clear\, defensible\, and actionable intelligence.
URL:https://shop.csilinux.com/training/csi-linux-socmint-masterclass-uncover-social-media-intelligence-and-digital-identities-with-puria-mehmandar-april-11th-2026/
LOCATION:ITL CSIL-CSMI
CATEGORIES:Training
ATTACH;FMTTYPE=image/png:https://shop.csilinux.com/wp-content/uploads/2026/03/CSIL-CSMI-2.png
END:VEVENT
END:VCALENDAR