

The Secrets of OSINT (Open-source Intelligence)
- Offered byUDEMY
The Secrets of OSINT (Open-source Intelligence) at UDEMY Overview
Duration | 4 hours |
Total fee | ₹389 |
Mode of learning | Online |
Credential | Certificate |
The Secrets of OSINT (Open-source Intelligence) at UDEMY Highlights
- Certificate of completion
- 30-Day Money-Back Guarantee
- Full Lifetime Access
The Secrets of OSINT (Open-source Intelligence) at UDEMY Course details
- For Security specialists and private investigators
- For penetration testers and ethical hackers
- For business intelligence specialists and HRs
- For journalists and law enforcement officers
- For Anyone who wants to be able to find out the truth about people and companies
- Information is the king today. If learner have it, they?ll be able to make the right decisions and win. If not, learner will be taken advantage of and lose. It relates to any area of life ? business, work, family, relationship and, especially, security
The Secrets of OSINT (Open-source Intelligence) at UDEMY Curriculum
Introduction
About the author
Disclaimer
Section 1. Going undercover
How to secure yourself from adversaries
Neutralizing Betrayers
Choosing a Browser James Bond Would Appreciate
Going for Search Engines that don't Track You
Section 2. Recruiting Intelligence Sources
Understanding the OSINT Chain
How to Trace an IP Address
How to Extract Hidden Data from an Email
Where Phone Numbers May Come
How to Get Invisible Information from an Image. Part 1. Reverse Search
How to Get Invisible Information from an Image. Part 2. Forensic Analysis
What's in a Name?
Practical Case: Vehicle Scammers Get Caught
Section 3. How to Make Search Engines Talk
Do You Speak Google? (begining)
Do You Speak Google? Getting to know with Google advanced operators (continued))
Seducing Duck
Time Travel by Wayback Machine
Practical Cases: Spotting a Bully and Two-Tongued Politician
Section 4. How to Interrogate Social Networks
Entering the Battlefield
Digging into Twitter
Digging into Twitter (continued)
Digging into Twitter (continued): Filters
Infiltrating LinkedIn
How to Spot a Person under
What about Facebook and Instagram?
Practical Cases: How to Spot Trolls in Twitter
Section 5. Loading Heavy Guns
Getting to Know with Maltego
Extracting Domain Names and IP Addresses Connections
Playing with Names, Emails and Phone Numbers
How to Track a Bitcoin Transaction
Efficient Tips&Tricks for your OSINT Investigations
BONUS! How to Make People Share Their Darkest Secret