Open-Source Intelligence Techniques (OSINT) Course
In this course you will be learning about OSINT (Open-source intelligence) from a hacker’s point of view. Tools, techniques, setting up a virtual lab, and how to protect yourself. This is a comprehensive course that will be using free open source tools to investigate people and companies. No matter if you are totally new to the fascinating world of OSINT and hacking or have some experience, this course will walk you through how both hackers and investigators use these tools and why.
This is a foundational course in open-source intelligence (OSINT) gathering that will move quickly through many areas of the field. While the course is an entry point for people wanting to learn about OSINT, the concepts and tools taught are far from basic. The goal is to provide the foundational knowledge for students to be successful in their fields, whether they are cyber defenders, threat intelligence analysts, private investigators, insurance fraud investigators, intelligence analysts, law enforcement personnel, or people who are curious about OSINT.
This Course Will Prepare You To:
- Create an OSINT process
- Conduct OSINT investigations in support of a wide range of customers
- Understand the data collection life cycle
- Create a secure platform for data collection
- Analyze customer collection requirements
- Capture and record data
- Create sock puppet accounts
- Harvest web data
- Perform searches for people
- Access social media data
- Assess a remote location using online cameras and maps
- Examine geolocated social media
- Research businesses
- Collect data from the dark web
Course Content
Module 1: Introduction to OSINT
-
What is OSINT?
-
History and evolution of OSINT
-
Use cases: Cybersecurity, law enforcement, journalism, business
-
OSINT vs Closed-source Intelligence
-
Legal and ethical considerations
Module 2: OSINT Methodology and Frameworks
-
OSINT lifecycle and workflow
-
OSINT tools classification
-
Frameworks (e.g., OSINT Framework, Maltego, Spiderfoot)
-
Planning and scope of an investigation
Module 3: Advanced Search Techniques
-
Google dorking and advanced search operators
-
Search engine alternatives (DuckDuckGo, Yandex, etc.)
-
Metadata in search results
-
Search filters and boolean logic
Module 4: Domain and Website Investigation
-
WHOIS lookup and DNS analysis
-
Subdomain enumeration
-
Website mirroring and offline analysis
-
Archive tools (Wayback Machine, Archive.today)
-
CMS and server identification
Module 5: Social Media Intelligence (SOCMINT)
-
Extracting intelligence from Facebook, Twitter, LinkedIn, Instagram
-
Account and identity analysis
-
Hashtag and trend tracking
-
Social media scraping tools
-
Geolocation and timeline analysis
Module 6: Email and Username Investigation
-
Email address tracking tools
-
Breach data search (HaveIBeenPwned, Dehashed)
-
Username search engines (Namechk, KnowEm)
-
Profiling with limited data
Module 7: Image and Video Intelligence
-
EXIF and metadata analysis
-
Reverse image search (Google, TinEye, Yandex)
-
Deepfake detection basics
-
Geolocation from imagery
-
Video analysis tools
Module 8: Geospatial Intelligence (GEOINT)
-
Maps and satellite imagery (Google Maps, Sentinel Hub)
-
Geolocation from photos and posts
-
IP geolocation techniques
-
OSINT mapping tools
Module 9: Dark Web and Deep Web Research
-
Understanding surface, deep, and dark web
-
Tor and anonymous browsing
-
Dark web search engines (Ahmia, OnionLand)
-
Legal considerations and risk management
Module 10: Anonymity, OpSec & Reporting
-
VPNs, proxies, and Tor for anonymity
-
Browser hygiene and data leakage prevention
-
Creating a safe virtual investigation lab
-
Compiling and documenting findings
-
Creating an OSINT report for clients or stakeholders
Final Project
What You Will Receive with This Course:
- A Digital Download Package with a custom Linux virtual machine. Labs will be run from this platform.
- An electronic workbook (inside the virtual machine) containing interactive labs.
Requirements
-
A computer (prefered), smartphone, or tablet with a internet connection. 8 gb memory and 40 gb of hdd to follow along with the VM
Who this course is for:
- Anyone that wants to learn OSINT, hackers, security professionals, investigators, people interested in security.
International student Fee 500 USD
- Tough Open-Ended Job Interview Questions
- Job Interview Question- What are You Passionate About?
- How to Prepare for a Job Promotion Interview
- Data Sciences Job Interview Must Know Questions
Job Interview Preparation (Soft Skills Questions & Answers)
- Tough Open-Ended Job Interview Questions
- What to Wear for Best Job Interview Attire
- Job Interview Question- What are You Passionate About?
- How to Prepare for a Job Promotion Interview
Your FREE eLEARNING Courses (Click Here)
Internships, Freelance and Full-Time Work opportunities
Flexible Class Options
- Week End Classes For Professionals SAT | SUN
- Corporate Group Trainings Available
- Online Classes – Live Virtual Class (L.V.C), Online Training
Related Courses
Ethical Hacking Course
Certified Information Security Manager (CISM)
CISA: Certified Information Systems Auditor Exam
Penetration Testing Certificate Training Services
ISO 27001 Information Security Management Systems – ISMS
ISO 27017-Information Security Controls for Cloud Services
ISO 22301 – ISMS Lead Auditor