Course curriculum

    1. Introduction to OSINT

    2. DNS Tools

    3. Shodan

    4. Netlas

    5. Google Dorks and AI

    6. Crosslinked

    7. theHarvester

    8. Zoomeye

    9. Metagoofil

    10. Whatweb, Netcraft, Builtwith

    11. Spiderfoot

    12. Paramspider

    1. Recon-NG Part I

    2. Recon-NG Part II

    3. Truecaller, Thatsthem and h8mail

    4. dehashed and instantcheckmate

    5. Finding Locations

    6. Techniques for Analyzing Images and Tracking Individuals

    1. Aircraft Surveillance and Analysis

    2. Ship Surveillance and Analysis

    1. Wigle and Ancenstry

    2. Tracking Individuals Using YouTube

    1. Venmo and more

    2. Tracking Transactions on the Blockchain

    1. Tools and Techniques Part I

    2. Tools and Techniques Part II

    3. Tools and Techniques Part III

About this course

  • $199.00
  • 27 lessons
  • 9 hours of video content

Open Source Intelligence (OSINT)

This intensive 4-day course equips cybersecurity professionals, threat analysts, and investigators with the foundational and practical skills necessary to master the art of Open Source Intelligence (OSINT). Through hands-on labs, structured exercises, and real-world case studies, participants will learn how to transform publicly available information into actionable intelligence for both offensive and defensive operations.

Students will gain hands-on experience using professional-grade OSINT tools such as Maltego, SpiderFoot, Recon-ng, and advanced techniques involving Google Dorking, metadata extraction, and infrastructure fingerprinting. The course also explores automation workflows using Python and APIs to scale data collection and enrichment.

Special emphasis is placed on:

  • Discreet collection methods and analyst OPSEC.

  • Digital footprint mapping and identity correlation.

  • Wi-Fi-based geolocation, domain tracking, and email footprinting.

  • Cryptocurrency tracing, online transaction monitoring, and image-based geolocation.

By the end of the course, participants will be able to independently conduct full-spectrum OSINT investigations, develop threat profiles using open-source data, and document intelligence findings with precision and professional methodology. This course is designed for red teamers, threat hunters, private investigators, and security professionals seeking to leverage open-source data in real-world offensive, defensive, and forensic scenarios.