Access Our On-Demand Training Anytime
This training is now available on demand, allowing you to learn at your own pace and on your own schedule. Once you secure your access, you’ll receive all the materials and instructions to dive right into the session.
Understanding Shadows
Get to know the environment used by criminals. Understand who is using Telegram for what purpose.
Searching Telegram
You will learn how to access Telegram, how to retrieve information and how to find users.
Analysis
Learn techniques and tools for analyzing individual accounts, groups, and channels.
Course Outline
- What are the shadows?
- Telegram & alternative social media
- Who hides in plain sight?
- Which threat actor activities take place on
- Crimes that leverage Telegram
- Case study
- How investigators can leverage Telegram for OSINT (& use cases)
- Understanding Telegram
- Overview & the unique aspects of Telegram
- Features and functionalities
- Operational Security
- Preparing your workspace
- Passive monitoring
- Searching Telegram
- Telegram internal searches & references
- Dorks
- Special search engines
- Databases
- User Account Information
- Finding and identifying user profiles
- Analyzing account data
- Expanding your research
- Group and Channel
- Investigating public and private groups
- Monitoring groups around events of interest
- Tools and Techniques
- Search Techniques
- Advanced techniques
- Content Analysis
- Traps & Limitations
Check your inbox to confirm your subscription