Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Secrets of OSINT (Open-source Intelligence)
Training Overview
Description of Training
Video Overview (6:31)
Introduction
About the Author (1:43)
Disclaimer (1:15)
Section 1 : Going undercover
1. How to secure yourself from adversaries (6:56)
2. Neutralizing Betrayers (9:47)
3. Choosing a Browser James Bond Would Appreciate (11:05)
4. Going for Search Engines that don't Track You (4:58)
Section 2 : Recruiting Intelligence Sources
5. Understanding the OSINT Chain (4:16)
6. How to Trace an IP Address (8:12)
7. How to Extract Hidden Data from an Email (6:47)
8. Where Phone Numbers May Come (7:15)
9. How to Get Invisible Information from an Image. Part 1. Reverse Search (10:34)
10. How to Get Invisible Information from an Image. Part 2. Forensic Analysis (7:36)
11. What's in a Name? (12:43)
12. Practical Case: Vehicle Scammers Get Caught (3:58)
Section 3 : How to Make Search Engines Talk
13. Do You Speak Google? (begining) (8:35)
14. Do You Speak Google? Getting to know with Google advanced operators (continued)) (7:50)
15. Seducing Duck (7:06)
16. Time Travel by Wayback Machine (5:48)
17. Practical Cases: Spotting a Bully and Two-Tongued Politician (6:37)
Section 4 : How to Interrogate Social Networks
18. Entering the Battlefield (5:32)
19. Digging into Twitter (7:56)
20. Digging into Twitter (continued) (5:17)
21. Digging into Twitter (continued): Filters (7:20)
22. Infiltrating LinkedIn (10:31)
23. How to Spot a Person (7:21)
24. What about Facebook and Instagram? (8:34)
25. Practical Cases: How to Spot Trolls in Twitter (5:45)
Section 5 : Loading Heavy Guns
26. Getting to Know with Maltego (8:52)
27.Extracting_Domain_Names_and_IP (8:10)
28. Playing with Names, Emails and Phone Numbers (8:34)
29. How to Track a Bitcoin Transaction (8:27)
30. Efficient Tips & Tricks for your OSINT Investigations (5:52)
31. BONUS! How to Make People Share Their Darkest Secret (6:46)
Audio Version of Training
Audio Download
1. How to secure yourself from adversaries
Download
Complete and Continue
Become a Member and Get
Unlimited Access
to 30,000+ Top Cyber Security Courses And Labs.
UPGRADE NOW