Learn Osint: Open-Source Intelligence
Published 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.04 GB | Duration: 5h 6m
Published 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.04 GB | Duration: 5h 6m
Become a cyber detective - This course prepares you to uncover hidden online information with Open Source Intelligence!
What you'll learn
Gather publicly available data to perform investigations
Analyze, and interpret data in investigations
Stay anonymous while browsing the web
Create, and use sock puppets to obtain information
Enhance and optimize the process of using search engines
Search people by their phone numbers, email addresses, names, and usernames
Search businesses and related information
Analyze and trace images
Investigate locations without the need to go there in person
Analyze blockchain transactions
Requirements
A device with an internet connection. Ideally a laptop and a smartphone with at least 40gb free on the hard drive.
A basic understanding of technology
Description
Master the art of Open Source Intelligence and unlock the secrets hidden across the internet. This course takes you from a beginner to an advanced OSINT practitioner with a straightforward, expert-guided approach.You’ll learn how to safely and effectively gather intelligence from publicly available sources, utilizing the same techniques used by investigators, cybersecurity professionals, and journalists. This course covers all essential aspects of OSINT, from the ethical considerations of information gathering to advanced search techniques and beyond.Explore a wide range of tools and techniques for uncovering information about individuals, companies, and even physical locations. You'll master the use of search engines, social media analysis, email tracing, and image verification, all while maintaining your anonymity and protecting your data.Learn how to set up secure environments using virtual machines, VPNs, and specialized operating systems like CSI Linux. Delve into the world of sock puppets, creating and managing fake identities to gather intelligence undetected. You’ll also explore the dark web, understand the importance of encryption, and discover how to remove your own data from the internet.By the end of this course, you’ll have a practical, hands-on skill set that will make you proficient in the art of OSINT. Whether you're aiming to enhance your career or satisfy your curiosity, this course is your gateway to mastering the world of online intelligence gathering.
Overview
Section 1: Introduction
Lecture 1 Introduction To OSINT
Lecture 2 Course Breakdown
Lecture 3 Osint Methodology
Section 2: Safety Measures
Lecture 4 Do We Need a VM ?
Lecture 5 VM Setup
Lecture 6 M1/M2/M3 Macbook Installation
Lecture 7 VPNs
Lecture 8 Browser Setup
Lecture 9 Handling Data In Investigation
Lecture 10 Section 2 Notes
Section 3: Documenting
Lecture 11 Advices & Tips On Documenting & Taking Notes
Section 4: Sock Puppets
Lecture 12 What Are They ?
Lecture 13 The Approach
Lecture 14 Setting Up Sock Puppets
Lecture 15 Advanced Techniques & Psyops
Lecture 16 Section 4 Notes
Section 5: Search Engines
Lecture 17 Google Search Operators
Lecture 18 Bing & DuckDuckGo Search Operators
Lecture 19 Yandex & Baidu Search Operators
Lecture 20 Section 5 Notes
Section 6: Searching People
Lecture 21 OSINT Tools List
Lecture 22 Searching Accounts
Lecture 23 Searching People Part 1
Lecture 24 Searching People Part 2
Lecture 25 Voter Records
Lecture 26 Searching Phone Numbers Part 1
Lecture 27 Searching Phone Numbers Part 2
Lecture 28 Performing Background Checks
Lecture 29 Section 6 Notes
Section 7: Searching Businesses
Lecture 30 Searching Companies Part 1
Lecture 31 Searching Company Part 2
Lecture 32 Section 7 Notes
Section 8: Resume Hunting
Lecture 33 Searching Resumes
Section 9: Email Search
Lecture 34 Enumerating and Verifying Email Addresses
Lecture 35 Email Associated Accounts
Lecture 36 Leads and Verifying
Lecture 37 Password Hunting
Lecture 38 Section 9 Notes
Section 10: Images
Lecture 39 Retrieving, Viewing & Handling EXIF Data
Lecture 40 Reverse Image Lookup
Lecture 41 Facial Recognition
Lecture 42 Section 10 Notes
Section 11: Social Media
Lecture 43 Twitter (X)
Lecture 44 Discord
Lecture 45 Instagram
Lecture 46 Facebook
Lecture 47 TikTok
Lecture 48 Others
Section 12: Legacy
Lecture 49 Legacy Lookup
Lecture 50 Section 12 Notes
Section 13: Physical OSINT
Lecture 51 Introduction
Lecture 52 Google Maps
Lecture 53 Bing
Lecture 54 Section 13 Notes
Section 14: Extras
Lecture 55 Requesting Data Removals
Lecture 56 Google Alerts
Lecture 57 Deep/Dark Web
Lecture 58 Accessing Dark Web With Tor
Lecture 59 Crypto OSINT
Lecture 60 Section 14 Notes
Beginner to advanced OSINT investigators,Cyber and information security professionals,Journalists,Business intelligence