Course Outline

Introduction

Overview of OSINT Principles and Approaches

  • Understanding the Intelligence Cycle
  • OSINT tools and techniques

Preparations

  • Preparing the machine and network connection
  • Installing OSINt Tools

Protecting Your Identity

  • Obfuscating your activities
  • Privacy and proxies

Gathering Data

  • Accessing sources of data
  • Mining the Dark Web
  • Turning data into valuable information

Capturing Timely Information

  • Monitoring Events in Real-time

Targeting Corporate Bodies

  • Collecting corporate information
  • Mapping out corporate identities, structures and hierarchies

Targeting Individuals

  • Collecting information on individuals

Assessing Consequential Actors

  • Identifying potential threats to government, economy, and safety
  • Criminal profiling

Mining Data

  • Scraping website content
  • Analyzing Big Data

Predictive Analysis

  • Employing Artificial Intelligence for visual and text analysis

Inspecting the Movement of Money

  • Credit card transactions and black markets
  • Tracking cryptocurrency transactions

Summary and Conclusion

Requirements

  • No special requirements

Audience

  • Researchers
  • Security analysts
  • Investigators
  • Law enforcement
  • Government and military personnel
  21 Hours
 

Testimonials

Related Courses

Open Source Cyber Intelligence - Introduction

  7 hours

Web Security with the OWASP Testing Framework

  28 hours

Ethical Hacker

  35 hours

CAS for Administrators

  7 hours

Shadowsocks: Set Up a Proxy Server

  7 hours

Network Security Administrator

  35 hours

NetNORAD

  7 hours

IoT Security Architecture

  14 hours

Understanding Modern Information Communication Technology

  7 hours

BeyondCorp: Implementing Zero Trust Security

  14 hours

Business Continuity Practitioner

  14 hours

Cyber Crisis & Communications Planning

  7 hours

Automotive Cyber Security Fundamentals

  21 hours

Advanced PHP and Secure Coding Course

  35 hours