OSINT: Open-Source Intelligence Level 2
4.4 (129 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,216 students enrolled

OSINT: Open-Source Intelligence Level 2

For hackers, investigators, and everyone else
4.4 (129 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
1,215 students enrolled
Created by Jeff M
Last updated 8/2020
English
English [Auto]
Current price: $41.99 Original price: $59.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 6 hours on-demand video
  • 1 downloadable resource
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • In this course students will learn more advance OSINT techniques, learn about social engineering to aid in OSINT investigations and more
Requirements
  • A basic understanding of OSINT and techniques or students from my previous OSINT course.
Description

In this course we will be continuing our learning and understanding of OSINT. If you took my previous course ( OSINT: Open-Source Intelligence For hackers, investigators, and everyone else) then this will be a continuation from that. In this course we continue learning about additional tools along with the how and why. We create burner accounts for OSINT, criminal background checks, vehicle lookups, using Kali Linux for OSINT, and much more.

This course is ideal for hackers, pentesters, investigators, HR, and everyone else. I appreciate that you are taking a look and hopefully joining this course. I work hard to provide great content and support. Feel free to check out my original OSINT course if you haven't already and preview the videos and read the reviews.

before, during and even after you take the course I will do my best to help you out with any questions that you have.

Happy hunting!


FYI, a reminder: I not anyone that is a part of DGS has any affiliation with any of the vendors, software manufactures, or programmers in this course.

Who this course is for:
  • Anyone that wishes to continue learning OSINT, investigators, network security professionals, or OSINT investigators that wish to build off of their basic/novice skillset.
Course content
Expand all 77 lectures 05:52:26
+ Introduction
4 lectures 09:05

Welcome to the OSINT 2 course, this is a continuation to the previous course that I have on Udemy. If you took that course or have a basic background in OSINT welcome. This course is designed to build off of that knowledge.

Preview 01:47

Yes, this is a quick disclaimer for the course.

Preview 01:05

I don't like talking about myself, but here is some info on who is teaching this course.

Preview 01:29
New update: What's next
04:44
+ Setting up our virtual machine with Virtualbox
2 lectures 17:06

In this video we take a look at installing Virtualbox version 6 on Windows.

Preview 05:34
CSI Linux
11:32
+ Checklist
3 lectures 19:51

In this video we go over a quick OSINT checklist.


Fast checklist
08:54

In this video we take a look at the newly released Firefox send for file transfers.

Firefox send
03:18

Collect information-Analyze information-Verify information-Record information.

OSINT cycle
07:39
+ Website crawling tools
4 lectures 16:43

It's time for some deep magic information gathering with Dmitry.

Dmitry
03:26

In this video we dig some domains with Dig.

Dig (Domain Information Groper)
02:38

In this updated video we will be installing the  reconnaissance tool Recondog and giving it a try.

ReconDog
06:05

Emails, sub domains, we can find them all with the harvester.

The Harvester
04:34
+ Social engineering
4 lectures 22:13

In this video we discuss how social engineering (SE) can be used in OSINT.

About social engineering and OSINT
04:51

Tracking URLS with Grabify.

Grabify
05:33

This was a clever technique that was discussed on the Privacy and Security podcast.

Tracking using a Visa gift card
06:48

In this video we take a look at spoofing emails and why.

Email spoofing
05:01
+ Home ownership
1 lecture 02:51

In this video we talk about how to find out who owns that home.

Finding who owns a home
02:51
+ Encryption
3 lectures 21:18

In this video we take a look at the encryption tool Veracrypt.

Veracrypt
07:30

In this video we talk about what a hashed password is and how to unhash it.

Hashed passwords
03:38

In this video we take a look at a live keylogger and keepass and why it's important to use a password manager. This is a clip from my Ethical Hacking course.

Keyloggers & Keepass
10:10
+ Canary tokens
2 lectures 15:58

In this video we talk about using Canary tokens to track a user.

Canary tokens
07:48

In this video we talk about how to embed a canary token into a email.

Canary token embedded
08:10
+ Nmap/Zenmap
1 lecture 12:16

In this video we learn how to scan a network with Nmap and Zenmap.

Nmap & Zenmap
12:16
+ Check username
2 lectures 09:35

Checking users with knowem.

https://knowem.com
03:39

In this video we give the full version of Pipl a spin.

Pipl pro
05:56