Overview
If you've been exposed to cybersecurity, especially in the realm of Social Engineering, you're likely familiar with OSINT, or Open Source Intelligence. This OSINT course is meticulously designed to offer a foundational grasp of OSINT by covering:
- The essence of OSINT
- The primary users of OSINT
- The ethical and moral considerations in utilizing OSINT
- Understanding OSINT within the cyber attack process
No prerequisites are required for this course, although a familiarity with technical terms such as "social engineering" is advantageous.
Study Resources:
- osintcurio.us
- hunter.io
- exploit-db.com/google-hacking-database
- shodan.io
- thispersondoesnotexist.com
- remove.bg
Upon completion, students will:
- Grasp the OSINT cycle
- Analyze potential investigative vectors
- Comprehend the functionality of different OSINT tools
- Perform basic OSINT investigations
- Prepare for advanced OSINT studies
Open Source Intelligence is a pivotal form of threat intelligence, driven by information that's publicly accessible. This course highlights the legality and public nature of the information collected and investigates its ethical implications and governing laws.
Throughout this course, participants will delve into the fundamentals of OSINT, including its definition, usage, ethical considerations, and how it acts as a cornerstone in cyber threat intelligence and cybersecurity defenses.
This OSINT training encompasses 51 minutes of comprehensive study, rewarding students with 1 CEU/CPE and a Certificate of Completion at the end. It targets not just cybersecurity professionals but anyone keen on exploring the realms of Ethical Hacking, Digital Forensics, Penetration Testing, and more, emphasizing the critical role of OSINT in identifying vulnerabilities and external threats. Whether for investigative purposes, due diligence, or safeguarding digital footprints, the knowledge imparted in this course is universally beneficial.
Ready to embark on your OSINT journey? Click the "Register" button at the top right corner to begin.
Provided by Cybrary, this course falls under various categories: Cybersecurity, Threat Intelligence, OSINT, Ethical Hacking, Digital Forensics, and Penetration Testing Courses.
Syllabus
Taught by
Tags