HOME > IT & Software > OSINT for beginners

OSINT for beginners

SynopsisOSINT for beginners, available at $44.99, has an average rati...
OSINT for beginners  No.1

OSINT for beginners, available at $44.99, has an average rating of 3, with 86 lectures, based on 2 reviews, and has 34 subscribers.

You will learn about OSINT Open Source Intelligence Fact checking Information gathering This course is ideal for individuals who are People interesting in OSINT (Open source intelligence) IT admins, investigators, law enforcement, home users, etc. It is particularly useful for People interesting in OSINT (Open source intelligence) IT admins, investigators, law enforcement, home users, etc.

Enroll now: OSINT for beginners

Summary

Title: OSINT for beginners

Price: $44.99

Average Rating: 3

Number of Lectures: 86

Number of Published Lectures: 86

Number of Curriculum Items: 86

Number of Published Curriculum Objects: 86

Original Price: $79.99

Quality Status: approved

Status: Live

What You Will Learn

  • OSINT
  • Open Source Intelligence
  • Fact checking
  • Information gathering
  • Who Should Attend

  • People interesting in OSINT (Open source intelligence) IT admins, investigators, law enforcement, home users, etc.
  • Target Audiences

  • People interesting in OSINT (Open source intelligence) IT admins, investigators, law enforcement, home users, etc.
  • In this course you will be learning about OSINT (Open-source intelligence) from a non regional view (i.e.. the tools will be much more open and not focused on the US). Tools, techniques, setting up a virtual lab, and how to protect yourself. This is a comprehensive course that will be using free open source tools to investigate people and companies. No matter if you are totally new to the fascinating world of OSINT and hacking or have some experience, this course will walk you through how both hackers and investigators use these tools and why.

    This course is designed to be beginner friendly and also help educate experienced individuals alike with a easy to follow and practical approach. Your safety is also important as we explore the use of sock puppets, a Linux virtual machine and more.

    This course is built from the previous best selling courses that I have taught over the years. The intention was to build a course that is more accessible to people inside and outside of the US. If you have taken any of the previous OSINT courses by me, I do not recommend taking this course as the majority will be review.

    Get stuck or have a question? Always feel free to send me a message and I will do my best to help you out!

    The course has been recorded using a Hyperx Quadcast mic, shock stand, mic arm, OBS Studio 1920×1080, 48kHz Stereo.

    FYI, a reminder: I not anyone that is a part of DGS has any affiliation with any of the vendors, software manufactures, or programmers in this course.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: What is this course?

    Lecture 2: What is OSINT and why is it important?

    Lecture 3: Disclaimer

    Lecture 4: What will you need?

    Lecture 5: DGS Start me page

    Chapter 2: Getting Started

    Lecture 1: Information overload and emotional impact

    Lecture 2: Avoiding Bias

    Lecture 3: What is a virtual machine (VM)?

    Lecture 4: Installing VB (And alternative for Mac M1 & M2 CPUs)

    Lecture 5: Installing CSI Linux

    Lecture 6: Basic Linux commands

    Lecture 7: Social Engineering

    Chapter 3: Methodology

    Lecture 1: OSINT Breakdown, Methodology, Mindmaps

    Lecture 2: Crossing the line, ethical and legal boundries

    Lecture 3: Tools (and websites) will break and sometimes fail you

    Lecture 4: Verifying results

    Lecture 5: Ask

    Chapter 4: Safety

    Lecture 1: Sock Puppets

    Lecture 2: Building a Sock Puppet

    Lecture 3: VPNs and kill switches

    Lecture 4: DNS Leak tests

    Lecture 5: CSI Tor Gateway

    Lecture 6: Disposable Emails

    Lecture 7: VOIP and Burner Phones

    Lecture 8: 2FA

    Lecture 9: Password Managers

    Lecture 10: Encryption

    Chapter 5: Reporting

    Lecture 1: Reports

    Lecture 2: CSI Reports

    Lecture 3: OBS

    Lecture 4: Right to be forgotten

    Chapter 6: Searches (Basic)

    Lecture 1: Google, Bing, Yandex, Baidu, Duck Duck Go

    Lecture 2: Google Dorks

    Lecture 3: Google Alerts

    Lecture 4: IntelX

    Chapter 7: Map searches

    Lecture 1: Google, Bing Maps

    Lecture 2: Sun Calculator

    Lecture 3: Weather reports

    Chapter 8: Photos

    Lecture 1: Analyzing photos

    Lecture 2: Car Stickers

    Lecture 3: GeoLocation

    Lecture 4: Exifdata

    Lecture 5: Photo Manipulation and Gan

    Lecture 6: Reverse Image Searches

    Chapter 9: Social Media

    Lecture 1: Twitter/X

    Lecture 2: Facebook

    Lecture 3: Snapchat

    Lecture 4: Telegram

    Lecture 5: Linkedin

    Lecture 6: WhatsApp

    Chapter 10: IP Addresses

    Lecture 1: IP to Location. VPN check, Tor Lookup

    Lecture 2: Canary Tokens

    Chapter 11: Browsers

    Lecture 1: Tor

    Lecture 2: Extentions

    Chapter 12: Darkweb

    Lecture 1: What is the Darkweb and how to browse it

    Lecture 2: Searching the Darkweb

    Chapter 13: Leaks and Dumps

    Lecture 1: DDOS and Wikileaks

    Lecture 2: Pastebin

    Lecture 3: Dehashed and HaveIbeenPwned

    Chapter 14: Tracking

    Lecture 1: Flight trackers and Boat Trackers

    Chapter 15: Websites

    Lecture 1: Things to look for

    Lecture 2: Wayback Machine

    Lecture 3: Builtwith

    Lecture 4: Whois

    Chapter 16: Crawling and searches

    Lecture 1: Spiderfoot

    Lecture 2: Maltego

    Lecture 3: Metagoofil

    Chapter 17: Virus and Malware

    Lecture 1: Hybridanalysis and Virustotal

    Chapter 18: Phones

    Lecture 1: LAN, Mobile, VOIP

    Lecture 2: Phoneinfoga Phonefy

    Chapter 19: Email

    Lecture 1: Email Validation and Phishtool

    Chapter 20: Media

    Lecture 1: News sites and Media Bias

    Lecture 2: Fact checking with Snopes

    Chapter 21: People searches

    Lecture 1: People Searches

    Lecture 2: USA Public Data Search

    Chapter 22: Crypto

    Lecture 1: Bitcoin wallet

    Chapter 23: Deaths and hospitals

    Lecture 1: Finding death records (Ancestry, calling, obituary)

    Instructors

  • OSINT for beginners  No.2
    Jeff Minakata
    OSINT, IT Professional, ethical hacker, Indy Game dev
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 0 votes
  • 3 stars: 2 votes
  • 4 stars: 0 votes
  • 5 stars: 0 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!