Welcome to our course for Open-Source Intelligence! We will cover what OSINT is, and why it’s used by law enforcement, cyber defenders, malicious actors, and even businesses. We will also cover a wide range of tools, to help you understand OSINT better, and provide hands-on skills and knowledge.
We will continually update this course, addressing any issues, and improving the content. If you find any problems or have a suggestion, please add your feedback to the form when applying for your completion certificate at the end of the course.
Below are the practical aspects that are included in this course, giving you a chance to put the knowledge you’ve learned into practice, and gain some hands-on experience.
TWEETDECK FOR DEFENSIVE MONITORING
You’ll be using TweetDeck, a platform designed to monitor the social-media platform Twitter. This incredible tool can be great for monitoring security vulnerabilities, terrorism, or anything else you want to track on a global scale!
Google Dorks, also referred to as Google Hacking, are a great way to create search queries that can find very specific content, such as admin login pages, or perform red team recon activities to identify old subdomains that could be an entry points into the target company.
Course challenge: profiling a person-of-interest
In this scenario, you are working for a law enforcement organisation, tracking a hacker that is selling access to compromised companies. You must gather all the information you can find on the target to aid the investigation.
Below is a list of the tools and services that this course will teach you how to use. Some tools or services may be missing from this list, so it should not be treated as a complete index for everything within the course.
- The Harvester
- Google Dorks
- OSINT Framework
- Reverse Image Searching (TinEye, Google)
If you complete the final exam, you will be eligible to receive an e-certificate showing that you have completed this course and developed your fundamental OSINT skills! Great for sharing on LinkedIn to showcase your motivation and drive to develop your skills (plus we love hearing from our students!)
This training course is Copyrighted by Security Blue Team 2020. Any copying, redistributing, or sharing in any way to non-paying students is an unlawful breach of this copyright, and will result in legal action to claim for damages.