• Post category:StudyBullet-6
  • Reading time:6 mins read


Open source intelligence OSINT, social engineering, malware and private investigator course for absolute beginner

What you will learn

You will learn about OSINT and it’s concepts in detail

You will be able to learn value and sources of OSINT

You will learn reconnaissance types

You will be able to learn by using business records and job posts for OSINT

You will be able to learn by using OSINT to find employees and email addresses

You will be able to learn using DNS, Dark web and Search engines for OSINT

and much more

Description

Welcome guys my name is Anwer Khan and I will be your instructor throughout this course. In this course, I will talk straight to the point. Therefore, we will cover more in less time.


Get Instant Notification of New Courses on our Telegram channel.


Now, Have you ever Googled someone before a job interview, or used social media to find out more information about someone you were going to meet? As it turns out true, you can use these skills in ethical hacking and penetration testing to help profile your target and hack into an organization.

Open-source intelligence or OSINT is the first step you’ll need to become a successful penetration tester.

In this course, you’ll get a high level overview of OSINT and when to use it. We’ll cover topics like the difference between active and passive reconnaissance, ways of tracking organizations and employees that work there, some tools and methods to gather OSINT information from sources you’d expect like social media and the dark web, but also sources you might not expect like job posts and DNS records.

And a lot of, that is collecting, analyzing, and turning OSINT data into actionable intelligence.

When you’re finished with this course, you’ll be able to immediately put OSINT to use.

I invite you to join me on this OSINT journey.

Let’s get started.

Thank You

English
language

Content

Starting

What is OSINT?
Understanding the value of OSINT
Passive reconnaissance
Active reconnaissance
Pros and cons of different reconnaissance
OSINT sources
Anonymizer and VPN

Organizational OSINT

Locations and addresses fingerprinting
Using breach data for OSINT
Using business records for OSINT
Job posts for OSINT

Employees

Using OSINT to find employees
OSINT to find phone numbers
Find email addresses
Using social media
Metadata from images

Technical OSINT

Using DNS
Crawling websites to gather OSINT data
Finding deleted information in web archives
Search engines for OSINT
Google hacking or Dorking for OSINT
Dark web for OSINT
RIRs