Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn OSINT (Open-source Intelligence) From Scratch
New section
Description of Training
Video Overview (3:57)
Section : Introduction to Open Soure Intelligence
Teaser- Finding Location, Phone Number + More From a Photo! (4:05)
Course Introduction (3:57)
What is OSINT (4:09)
Section : Search Engines OSINT
Introduction to Search Engines OSINT (1:44)
Section : Search Engine OSINT - Google Search Operators
Discovering Social Media Profiles Accounts (8:43)
Discovering Sensitive Information About People (8:44)
Discovering PDF Documents Associated with Targets (4:01)
Find Hidden Search Results (3:17)
Find Cameras & More With GHDB (3:42)
Enhancing Google Searches with AI (2:55)
Search : Search Engine OSINT - Bing Search Operators
Discovering Additional Information & Online Accounts Using Bing (6:31)
Beyond Google Finding Hidden Information (5:58)
Section : Digging Deeper with Alternative Search Engines
Find More with Special Yandex Operators (7:06)
Expanding Results with Alternative Search Tools (2:36)
Practice Test 1: Quiz
Section : Database Breaches & Leaks - Finding Passwords, Emails, Locations + More!
Introduction to Database Breaches & Leaks (1:26)
Understanding the Difference Between Breached & Leaked Database (2:47)
Finding Relevant Breach Leak Databases (5:46)
Finding Emails, Passwords & More (8:27)
Finding Addresses, Phone Number & More (4:01)
Section : Downloading Leak Breach Databases
Setting Up an Isolated Virtual Environment (8:17)
Installing Needed Software to Manage Leaked Databases (2:54)
Downloading & Accessing Leaked Facebook Data (6:07)
Downloading & Accessing Leaked Twitter Data (7:15)
Downloading & Accessing Leaked LinkedIn Data (3:57)
Downloading & Accessing Leaked Snapchat Data (4:56)
Finding Leaked Databases on The Internet (3:09)
Recap (1:49)
Section : Building a Sock Puppet Identity for OSINT
Introduction to Sock Puppet Accounts in OSINT (1:45)
Creating an Untraceable Covert Account (4:22)
How to Keep Your Covert Account Safe & Active (4:48)
Section : Social Media Intelligence (SOCMINT)
Introduction to Social Media OSINT (SOCMINT) (1:16)
Section : Facebook OSINT
Extracting Valuable Information From a Facebook Profile (9:29)
Extracting User ID, Facebook Friends & More (8:22)
Uncovering Emails and More from Facebook Profiles (3:48)
Finding CommentsTags of a Facebook Account (2:15)
Facebook OSINT Recap (1:58)
Section : Instagram OSINT
Extracting the User ID of an Instagram Account (7:31)
Extracting Timestamps from Posts and Comments (2:56)
Uncovering Comments of Private Instagram Accounts (5:12)
Extracting Hidden Information from Instagram Metadata (4:17)
Scraping Instagram Followers (7:39)
Downloading Instagram Posts (1:52)
Section : Creating an OSINT Virtual Machine
Installing Trace Labs OSINT VM (3:47)
OSINT VM Overview (3:25)
The Terminal & Linux Commands (5:38)
Install Essential OSINT Tools (5:12)
Automatically Download Instagram Profiles (8:32)
Undetectable Instagram Info Extraction (2:51)
Section : Twitter OSINT
Extracting X Twitter User IDs (6:00)
Recovering Deleted Tweets and Timestamps (5:05)
Leveraging Search Operators to Find Specific Tweets (4:47)
Discovering Tweets Posted from a Specific Location (4:44)
Twitter OSINT Recap (1:38)
Section : LinkedIn OSINT
Discovering and Analysing LinkedIn Profiles (6:51)
Finding Hidden Names & Extracting Post Timestamps (7:52)
Finding LinkedIn Profile Member IDs (2:54)
Section : Other Social Media OSINT
Snapchat OSINT - Downloading Stories & Extracting Metadata (5:11)
TikTok OSINT - Downloading Videos, Extracting Timestamps, Metadata & More (9:29)
Section : Username OSINT - Tracking Online Identities
Introduction to Username OSINT (1:06)
Tracking a Username Using Advanced Search Techniques (6:05)
Finding Hidden Profiles with Reverse Username Lookup (5:25)
Finding Linked Accounts Across the Web (6:04)
Finding Passwords & Other BreachedLeaked Data Connected to a Username (5:45)
Discovering Additional Online Accounts Automatically (2:59)
Recap (1:31)
Section : People OSINT - Uncovering Personal Information Online
Introduction to People OSINT (1:37)
Finding the Geographic Origins of a Name (4:19)
Find Personal Details Using Advanced Search Techniques (6:31)
Discovering Social Media Accounts Linked to a Person (5:51)
Discovering Phone Numbers, Addresses, DOB, and More (6:42)
Uncover Political Party Affiliations (6:21)
Finding Partners and Maiden Names in Registries (7:00)
Recap (2:06)
Section : Email OSINT - Finding Email Addresses
Introduction to Email OSINT (1:37)
Uncovering Emails From SocialOnline Accounts (4:42)
Finding Emails Using Advanced Search Techniques (3:22)
Uncovering Emails Linked to Usernames (5:12)
Creating and Verifying Possible Email Addresses (5:32)
Uncovering Emails with Browser Tools (5:54)
Finding Business Email Addresses (4:59)
Discovering Emails Within Data BreachesLeaks (2:24)
Extracting Emails from GitHub Accounts (4:46)
Recap (2:18)
Section : Email OSINT - Discovering Info Linked to an Email Address
Tracking the Identity Behind an Email Address (5:51)
Leveraging Password Resets to Validate Email Addresses (4:53)
Investigating an Email Address for Red Flags (4:31)
Uncovering Websites & Accounts Linked to an Email Address (8:29)
Discovering More Websites Linked to an Email Address (4:55)
Gmail OSINT - Discovering Phone number, reviews, addresses and more (8:38)
Identify Data Leaks Linked to an Email Address (4:38)
Discovering LinkedIn Profiles Linked to an Email (2:09)
Leveraging Usernames and Emails to Discover Additional Accounts (5:51)
Recap (3:18)
Section : Phone Number OSINT - Discovering Phone Numbers
Tracking a Phone Number Across Online Platforms (7:29)
Uncovering Phone Numbers Linked to Linkedin Accounts (2:13)
Discovering Sensitive Details Linked to a Phone Number (1:57)
Finding Phone Numbers in Leaked Databases (4:46)
Recap (1:39)
Section : Phone Number OSINT – Finding Details Behind a Number
Uncovering Detailed Phone Number Information (7:23)
Revealing Sensitive Information Using Advances Search Techniques (4:31)
Uncovering the Identity Behind a Phone Number (5:46)
Finding the Caller ID in the US (5:02)
Uncovering Accounts Registered with a Phone Number (4:31)
Discovering Leaked Information Linked to a Phone Number (6:26)
Deep Phone Number Scanning & Footprinting (4:42)
Recap (2:08)
Section : Image OSINT
Introduction to Image OSINT (1:16)
Gathering Profile Images for OSINT Investigations (3:26)
Section : Image OSINT - Reverse Image Search
Tracking Images Using Google (6:12)
Discovering Location of an Image (3:31)
Discovering Similar PicturesImages on the Internet (3:57)
Expanding the Search with Specialized Image Engines (2:22)
Section : Image OSINT - Facial Recognition
Track Online PresenceProfiles Using a Photo (8:29)
Section : Image OSINT - Geo Location Tracking
Using AI to Identify an Image Location (4:34)
Discovering Image location Using Search Engines (2:54)
Extracting Location, Device Info and More From Images (4:20)
Section : Maps OSINT – Using Maps for Geolocation Analysis
Introduction to Maps OSINT (1:33)
Uncovering Key Details About Any Location (5:36)
Viewing Satellite Imagery from Different Angles (3:32)
Extracting Key Insights from Eastern Europe Maps (4:26)
Using Apple Maps without an Apple Device (2:40)
Investigating Places with Street-Level Imagery (5:24)
Geo-Locating Images Using OpenStreetMap (OSM) (6:44)
Extract Additional Information Using Google Earth (4:50)
Section : Website OSINT – Analyzing Website Data for Intelligence
Introduction to Website OSINT (1:56)
Discovering Website Owners & Hidden Contact Details (7:49)
Identifying Technologies used in a Website (4:01)
Discovering Subdomains (4:33)
Extracting Information From DNS Records (4:17)
Uncovering Websites Under the Same Ownership (3:31)
Tracking a Website-s Changes and Updates (5:10)
Investigating Website’s Files for Hidden Information (8:10)
Section : Website OSINT with OSINT TraceLabs VM
Discovering Subdomains (5:19)
Investigate a WordPress Websites (4:53)
Automating OSINT Investigations (6:09)
Section : Reporting
Introduction to OSINT Reporting (0:56)
Cleaning and Structuring Notes (5:48)
Reviewing Collected Information & Relationships (3:13)
Creating an OSINT Relationship Map (5:48)
Structuring Open-Source Investigations (5:06)
Writing a Professional OSINT Report (5:34)
Breaking Down a Real-World OSINT Case Report (4:26)
Section: Course Exam
Practice Test 2: OSINT Exam
Audio Version of Training
Audio Download
Downloading & Accessing Leaked LinkedIn Data
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock