Course: OSINT: Open-Source Intelligence

OSINT: Open-Source Intelligence

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
  • Self-Paced
About this Course

In this course you will be learning about OSINT (Open-source intelligence) from a hacker's point of view. Tools, techniques, setting up a virtual lab, and how to protect yourself. This is a comprehensive course that will be using free open source tools to investigate people and companies. No matter if you are totally new to the fascinating world of OSINT and hacking or have some experience, this course will walk you through how both hackers and investigators use these tools and why. 

Get stuck or have a question? Always feel free to send me a message and I will do my best to help you out!

Basic knowledge
  • The ability to add/modify software on your PC. Some Linux experience will help, but not necessary (We will cover some Linux basics in this course)
What you will learn
  • By the end of the course you will have a good understanding of OSINT, how to perform it, the tools necessary, and how your own information online could be used against you. You will learn Linux basics, and how to setup your own virtual lab
Number of Lectures: 53
Total Duration: 05:20:37
  • Introduction  

    Welcome to the course!

  • Disclaimer  

    A brief disclaimer before we start the course.

  • What will you need?  

    What will you need for this course?

  • Virtualization  

    In this section we talk about what virtualization is and how to set up our lab.

  • Setting up our lab  

    In this video we setup our virtual OSINT lab.

  • Terminal  

    In this video we learn some basic Linux commands

  • OSINT steps  

    IN this video we discuss the steps when it comes to OSINT.

  • Cherry Tree  

    In this video we take a look at the program Cherry tree for notation and report writting.

  • Tor  

    In this video we take a look at the Tor browser for private browsing and darkweb viewing.

  • OSINT Framework  

    In this video we take a look at the OSINT framework, a collection of useful links for our OSINT investigations.

  • Darkweb  

    In this video we talk about the darkweb and how to navigate it.

  • Hunchly  

    In this video we take a look at the tool Hunchly for OSINT investigations.

  • Sudo  

    In this video we take a look at the iOS program Sudo for burner numbers and emails.

  • 33 Mail  

    Protecting our identity with a burner email.

  • Gurilla mail  

    Sometimes we need a disposable email address, Gurilla mail to the rescue.

  • 20 Minute mail  

    Another disposable email service for a quick, disposable email.

  • Securing your information  

    A important part of OSINT is being able to secure your data and communication. In this video we look at some methods for that.

  • Secure file transfer  

    In this video we look at encrypted file transfer.

  • Spiderfoot  

    In this video we crawl websites for data using Spiderfoot.

  • Maltego  

    In this video we look at the Swiss army knife of OSINT tools, Maltego.

  • Cloning websites  

    Sometimes we need to inspect a target website or preserve it.

  • OSIRT  

    OSIRT is designed for law enforcement OSINT investigations. However it is a free opensource tool for Windows.

  • Metagoofil  

    Scraping sites for data.

  • Media capture  

    In this video we take a look at capturing media from our target site.

  • Reverse email search  

    In this video we do reverse email searching.

  • Resume  

    Want to find out more about our target? A resume search might be the answer.

  • Reverse number  

    Phone number searches.

  • Family tree  

    A family tree can be a useful tool in tracking and identifying a target.

  • Geolocation  

    Tracking users my photos and geolocation.

  • Google advance operators  

    Using Google's advance string operators.

  • Google Maps  

    Leveraging Google maps to learn more about our target location.

  • Google alerts  

    Setting up alerts on Google.

  • Business searches  

    In this video we look at ways we can dig deeper into searching a target business.

  • Inteltechniques  

    In this video we take a look at the OSINT website Inteltechniques.

  • Data breaches  

    In this video we look at data breaches and how we can leverage them for OSINT.

  • Dehashed  

    We look at another data breach site that can be used for OSINT.

  • Way back machine  

    Nothing is ever really erased from the internet... We take a look at a way to resurrect websites that were thought to be long gone.

  • Hooktube  

    Need to view a target's Youtube video without them knowing?

  • Website digging  

    In this video we dig through website domains and other information.

  • Image verification  

    Verifying images online with Surfsafe. Is that image real or is it Photoshopped?

  • Visualping  

    Visualping is a tool that will alert us when a change has been made to a website.

  • Social media  

    In this video we take a look at some additional social media tools.

  • Stud or Dud  

    In this video we use the dating app for OSINT.

  • Webmii  

    Social media scoring with Webmii.

  • Twitter  

    In this video we take a look at some Twitter tools for OSINT.

  • Instalooter  

    In this video we use the program Instalooter to download our target's Instagram images for OSINT.

  • Skiptracer  

    In this video we take a look at the versatile tool Skiptracer.

  • Steganography  

    In this video we learn about steganography.

  • Bitcoin/sextortion scams  

    In this video we discuss sextortion scam and bitcoin demands and how you can track them.

  • Tor connection?  

    In this video we look at a way to identify if the IP we are looking at was a Tor connection.

  • Canary tokens  

    In this video we discuss canary tokens. What they are, how to make them, and how to use them for OSINT.

  • Rolling out an investigation  

    In this video we discuss how a investigation might play out.

  • In closing  

    Finishing the course.

Reviews (0)