Course curriculum

    1. 1 Introduction to Ultimate OSINT

    2. 2 Privacy vs Anonymity

    3. 3 Different Adversary Levels

    1. 4 OPSEC Part I

    2. 5 OPSEC Part II

    1. 6 OSINT for Infrastructure Part I

    2. 7 OSINT for Infrastructure Part II

    3. 8 OSINT for Infrastructure Part III

    4. 9 Google Dorks

    1. 10 Gathering Information About Websites Part I

    2. 11 Gathering Information About Websites Part II

    3. 12 Gathering Information About Websites Part III

    1. 13 OSINT on People Part I

    2. 14 OSINT on People Part II

    3. 15 OSINT on People Part III

    4. 16 OSINT on People Part IV

    1. 17 Tracking Aircraft

    2. 18 Tracking Maritime Vessels

    3. 19 Wigle

About this course

  • $199.00
  • 23 lessons
  • 7.5 hours of video content

Pricing options

Now you can have Lifetime Access!

Open Source Intelligence (OSINT)

This intensive 4-day course equips cybersecurity professionals, threat analysts, and investigators with the foundational and practical skills necessary to master the art of Open Source Intelligence (OSINT). Through hands-on labs, structured exercises, and real-world case studies, participants will learn how to transform publicly available information into actionable intelligence for both offensive and defensive operations.

Students will gain hands-on experience using professional-grade OSINT tools such as Maltego, SpiderFoot, Recon-ng, and advanced techniques involving Google Dorking, metadata extraction, and infrastructure fingerprinting. The course also explores automation workflows using Python and APIs to scale data collection and enrichment.

Special emphasis is placed on:

  • Discreet collection methods and analyst OPSEC.

  • Digital footprint mapping and identity correlation.

  • Wi-Fi-based geolocation, domain tracking, and email footprinting.

  • Cryptocurrency tracing, online transaction monitoring, and image-based geolocation.

By the end of the course, participants will be able to independently conduct full-spectrum OSINT investigations, develop threat profiles using open-source data, and document intelligence findings with precision and professional methodology. This course is designed for red teamers, threat hunters, private investigators, and security professionals seeking to leverage open-source data in real-world offensive, defensive, and forensic scenarios.