This course focuses on Open-Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they are interested in:

  • Gaining a better understanding of OSINT techniques
  • Improving investigative skill set
  • Improving overall research methodology
  • Improving personal OPSEC

OSINT is one of the key skills required for both Red and Blue Team jobs - if you want to put these skills in your resume with confidence, this course will help!

Who is this course for? 

This course is the key to competent OSINT collection, analysis, and reporting using the most up-to-date tools, techniques and procedures. It is the key component for OSINT Analysts, an essential add-on for cyber security researchers, fraud/cybercrime investigators and anyone who is interested in improving their cybersecurity skill set. 

Why take it NOW?

In 2022, open-source intelligence is a key skill that the cyber security field demands. You need to understand OSINT in-depth to be one step ahead, no matter what domain you’re pursuing in cybersecurity.

The study of OSINT techniques, tools and procedures allows you to obtain plenty of information on your targets, from social media handles to email addresses. Using OSINT skills can aid in investigations, cyber risk management, threat hunting, and penetration testing.

Collecting, analyzing, and reporting OSINT demonstrates your abilities as a superior analyst and sets you apart from others.

Why THIS course? 

This OSINT course comes with a blend of new OSINT techniques and tools, including website intelligence, data and graph vizualization, as well as deep web and dark web OSINT skills that are currently in high demand. 


Course benefits:

What tools will you use?

  • Maltego
  • Shodan
  • Recon-ng
  • Spiderfoot
  • HaveIbeenPwned
  • HTTrack
  • Hunter.io
  • Sherlock
  • Profiler
  • Ghunt
  • and others!  (TheHarvester, GHDB, etc…)

What skills will you gain?

  • Knowledge of Open-Source Intelligence tools and methodologies
  • Extracting information from social media profiles (Facebook, Twitter, Instagram and others)
  • Gathering information from websites with OSINT tools
  • Phishing link analysis
  • Corporate profiling used in business intelligence
  • OSINT report writing

What will you learn about?

This course lays out the path to understanding differences between active and passive OSINT, and gives you the ability to demonstrate keen analytical skills. Throughout this course, you’ll view and perform labs to understand a wide range of OSINT tools, techniques, procedures and research methods, starting with the OSINT Framework. You will see how to conduct persona-based social media research. You will learn about fraud and cybercrime investigation procedures using OSINT.


Course general information: 

DURATION: 18 hours

CPE POINTS: On completion, you get a certificate granting you 18 CPE points. 

SELF-PACED, PRE-RECORDED

START ON OCTOBER 6TH 

Course format: 

  • Self-paced
  • Pre-recorded
  • Accessible even after you finish the course
  • No preset deadlines
  • Materials are video, labs, and text
  • All videos captioned

What will you need?

  • A computer with 4-8 GB RAM
  • 20 GB Storage
  • Internet Connection
  • Zeal to Learn

What resources will you receive?

  • OSINT report template
  • Plugin links
  • VM machine
  • OSINT tools
  • OPSEC tools list
  • List of OSINT bookmarks

What should you know before you join?

  • No previous OSINT knowledge is required, you will learn everything from scratch.
  • Interest, curiosity, and/or experience in the cybersecurity field are strongly encouraged. 

YOUR INSTRUCTOR: Lakshit Verma

Lakshit Verma: Cyber crime investigator and OSINT analyst, security professional with demonstrated record in cyber crime investigations, an internationally acclaimed speaker & mentor.

COURSE SYLLABUS


Module 0

Introduction to OSINT

 

In Module Zero, the attendees will get to learn about everything we’re going to cover right from scratch, including OSINT and OPSEC Concepts.

  • Introduction to OSINT
  • What is Open-Source Intelligence? 
  • What is Operational Security?
  • Understanding OSINT Framework

Module 1

Setting up the Environment

 

In Module 1, the attendees will start to learn about everything with a practical approach to setting up labs and VMs to conduct online investigations.

  • Creation of sock puppets (practical)
  • Getting started with OSINT Framework (installation, configuration, operation)
  • Setting up OSINT VM lab (practical)
  • Setting up OSINT report (documentation using Note Writers)
  • OPSEC setup: installing VPN/TOR with proxy chaining
  • Setting up sock puppets with fake emails/DP/disposable phone numbers
  • What is API keys, their usage and configuration

Exercises:

  1. Set up your own OSINT lab and sock puppet accounts (provide a few target scenarios).

Module 2

People OSINT

 

In Module 2, the attendees will start finding out about people search-based OSINT investigations with online/offline OSINT tools providing different inputs like email/photo, etc. 

  • User name OSINT (practical)
  • Reverse image search (Google Lens , Google, Bing, Yandex)
  • Phone number OSINT : Phoneinfoga (practical)
  • GHunt: email OSINT (practical)
  • Sherlock framework (practical)
  • Public records database (HIBP/Dehashed)
  • Crawling for index data on different search engines (Google, Yandex bing)
  • Google Dorking/Hacking & Google Dorks, GHDB

 

Exercises:

  1. Email information gathering using GHUNT
  2. Metadata analysis of a photograph
  3. Gathering information of email using Maltego

Module 3

Social Media OSINT

 

In Module 3, the attendees will dive into social media based OSINT investigations with online/offline OSINT Tools via different analysis methods across text/video-based social media platforms.

  • Facebook OSINT (practical)
  • Instagram OSINT (practical)
  • Twitter OSINT
  • YT OSINT (practical)
  • Snapchat OSINT (practical)
  • Working with geotagging & geolocation GEOINT
  • Accessing public records/media/text/files

Exercises:

  1. Information gathering using Maltego

Module 4

Website & Company OSINT

 

In Module 4, the attendees will learn website-based OSINT investigations with online/offline OSINT tools and company-based searches, also including company emails to data breaches.

  • Intelx search engine (Practical)
  • Business email identifier Hunter.io
  • Corporate OSINT: ZoomInfo
  • Httrack website downloader (practical)
  • Deleted websites OSINT using Waybackmachine (practical)
  • Website footprinting using Spiderfoot (practical)
  • Shodan/Censys/Neoltas queries & hunting (practical)
  • Github reconnaissance 
  • OSINT Bug hunting (Github, Recon, Favicon, Metadata)
  • Preparing Open Source Intelligence Reports
  • Essential plugins for OSINT/browser (OPSEC Plugins)

Exercises:

  1. Getting archived/cached versions of websites
  2. Finding emails of employees of a company
  3. Harvesting email using email harvester (Kali Linux)

Final exam: 

MCQ Test: All the material overviewed in this course.


QUESTIONS? 

If you have any questions, please contact our eLearning Manager at [email protected].

Course Reviews

N.A

ratings
  • 5 stars0
  • 4 stars0
  • 3 stars0
  • 2 stars0
  • 1 stars0

No Reviews found for this course.

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013
GET A FREE EDITION!
Join our newsletter and receive for FREE, our premium edition “Brute Force and Supply Chain Attacks”
x