Course Outline

Introduction

Overview of OSINT Principles and Approaches

  • Understanding the Intelligence Cycle
  • OSINT tools and techniques

Preparations

  • Preparing the machine and network connection
  • Installing OSINt Tools

Protecting Your Identity

  • Obfuscating your activities
  • Privacy and proxies

Gathering Data

  • Accessing sources of data
  • Mining the Dark Web
  • Turning data into valuable information

Capturing Timely Information

  • Monitoring Events in Real-time

Targeting Corporate Bodies

  • Collecting corporate information
  • Mapping out corporate identities, structures and hierarchies

Targeting Individuals

  • Collecting information on individuals

Assessing Consequential Actors

  • Identifying potential threats to government, economy, and safety
  • Criminal profiling

Mining Data

  • Scraping website content
  • Analyzing Big Data

Predictive Analysis

  • Employing Artificial Intelligence for visual and text analysis

Inspecting the Movement of Money

  • Credit card transactions and black markets
  • Tracking cryptocurrency transactions

Summary and Conclusion

Requirements

  • No special requirements

Audience

  • Researchers
  • Security analysts
  • Investigators
  • Law enforcement
  • Government and military personnel
  21 Hours
 

Testimonials

Related Courses

Advanced PHP and Secure Coding Course

 35 hours

Participants attending this course will Understand basic concepts of security, IT security and secure coding Learn Web vulnerabilities beyond OWASP Top Ten and know how to avoid them Learn client-side vulnerabilities and secure coding

BeyondCorp: Implementing Zero Trust Security

 14 hours

BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN. In this instructor-led, live training, participants will learn hands-on how to set up a

Cyber Crisis & Communications Planning

 7 hours

This course discusses how to manage an incident response team, how the first responder act, given the frequency and complexity of today's cyber attacks, incident response is a critical function for organizations. Incident response is the

Ethical Hacker

 35 hours

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the

Understanding Modern Information Communication Technology

 7 hours

This course covers the basic concepts of security and IT Security, with an emphasis on defending against network attacks. Participants will gain an understanding of essential security protocols and security concepts of web services. Recent attacks

Automotive Cyber Security Fundamentals

 21 hours

Automotive refers to the securing of automotive electronic systems, communication networks, control algorithms, software, users, and underlying data from malicious attacks, damage, unauthorized access, or manipulation. This instructor-led, live

Business Continuity Practitioner

 14 hours

This course is designed to help the attendee to build organizational resilience against a range of threats so that organizations can respond effectively to incidents, maintain the availability of business operations and safeguard its

CAS for Administrators

 7 hours

CAS, or Central Authentication Service, is an open-source, enterprise-level, single-sign-on protocol for the web. CAS gives users access to multiple applications using a single sign-on and allows web applications to authenticate users without giving

Certified Ethical Hacker

 35 hours

Objectives: To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification Target Audience: This course will significantly benefit

IoT Security Architecture

 14 hours

Internet of Things (IoT) is a network infrastructure that connects physical objects and software applications wirelessly, allowing them to communicate with each other and exchange data via network communications, cloud computing, and data capture.

NetNORAD

 7 hours

NetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling. In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them

Network Security Administrator

 35 hours

Audience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.  

Open Source Cyber Intelligence - Introduction

 7 hours

This Introduction to Open Source Intelligence (OSINT) course will provide delegates with skills to become more efficient and effective at finding those key pieces of intelligence on the Internet and World Wide Web. The course is highly practical

Web Security with the OWASP Testing Framework

 28 hours

The Open Web Application Security Project (OWASP) is an online community that creates freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. OWASP offers web security testing

Shadowsocks: Set Up a Proxy Server

 7 hours

Shadowsocks is an open-source, secure socks5 proxy. In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy. By the end of this training, participants will be able