Course Outline
Introduction
Overview of OSINT Principles and Approaches
- Understanding the Intelligence Cycle
- OSINT tools and techniques
Preparations
- Preparing the machine and network connection
- Installing OSINt Tools
Protecting Your Identity
- Obfuscating your activities
- Privacy and proxies
Gathering Data
- Accessing sources of data
- Mining the Dark Web
- Turning data into valuable information
Capturing Timely Information
- Monitoring Events in Real-time
Targeting Corporate Bodies
- Collecting corporate information
- Mapping out corporate identities, structures and hierarchies
Targeting Individuals
- Collecting information on individuals
Assessing Consequential Actors
- Identifying potential threats to government, economy, and safety
- Criminal profiling
Mining Data
- Scraping website content
- Analyzing Big Data
Predictive Analysis
- Employing Artificial Intelligence for visual and text analysis
Inspecting the Movement of Money
- Credit card transactions and black markets
- Tracking cryptocurrency transactions
Summary and Conclusion
Requirements
- No special requirements
Audience
- Researchers
- Security analysts
- Investigators
- Law enforcement
- Government and military personnel
Testimonials
His way of thinking
MediaSci
Related Courses
Advanced PHP and Secure Coding Course
35 hoursParticipants attending this course will Understand basic concepts of security, IT security and secure coding Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them Learn client-side vulnerabilities and secure coding
BeyondCorp: Implementing Zero Trust Security
14 hoursBeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN. In this instructor-led, live training, participants will learn hands-on how to set up a
Cyber Crisis & Communications Planning
7 hoursThis course discusses how to manage an incident response team, how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the
Ethical Hacker
35 hoursThis class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the
Understanding Modern Information Communication Technology
7 hoursThis course covers the basic concepts of security and IT Security, with an emphasis on defending against network attacks. Participants will gain an understanding of essential security protocols and security concepts of web services. Recent attacks
Automotive Cyber Security Fundamentals
21 hoursAutomotive refers to the securing of automotive electronic systems, communication networks, control algorithms, software, users, and underlying data from malicious attacks, damage, unauthorized access, or manipulation. This instructor-led, live
Business Continuity Practitioner
14 hoursThis course is designed to help the attendee to build organizational resilience against a range of threats so that organizations can respond effectively to incidents, maintain the availability of business operations and safeguard its
CAS for Administrators
7 hoursCAS, or Central Authentication Service, is an open-source, enterprise-level, single-sign-on protocol for the web. CAS gives users access to multiple applications using a single sign-on and allows web applications to authenticate users without giving
Certified Ethical Hacker
35 hoursObjectives: To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification Target Audience: This course will significantly benefit
IoT Security Architecture
14 hoursInternet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data capture.
NetNORAD
7 hoursNetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling. In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them
Network Security Administrator
35 hoursAudience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
Open Source Cyber Intelligence - Introduction
7 hoursThis Introduction to Open Source Intelligence (OSINT) course will provide delegates with skills to become more efficient and effective at finding those key pieces of intelligence on the Internet and World Wide Web. The course is highly practical
Web Security with the OWASP Testing Framework
28 hoursThe Open Web Application Security Project (OWASP) is an online community that creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. OWASP offers web security testing
Shadowsocks: Set Up a Proxy Server
7 hoursShadowsocks is an open-source, secure socks5 proxy. In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy. By the end of this training, participants will be able