The OSINT Handbook

(OSINT.AJ1)
Lessons
Lab
AI Tutor (Add-on)
Get A Free Trial

Skills You’ll Get

1

Preface

  • Who this course is for
  • What this course covers
  • Conventions used
  • Get in touch
  • Share your thoughts
  • Download a free PDF copy of this course
2

The Secrets Hiding in Plain Sight – Unveiling the Power of OSINT

  • Introduction to OSINT
  • Passive and active OSINT
  • Why OSINT matters in the digital age
  • The OSINT framework
  • Getting started with OSINT and some best practices
  • Summary
3

Invisible and Untouchable – The Importance of Anonymity in OSINT Analysis

  • Introduction to anonymity and privacy in OSINT
  • Protecting your digital footprint
  • Staying ahead of cyber threats in OSINT
  • Summary
4

The OSINT Toolbox – Methods and Techniques for Gathering and Analyzing Information

  • Introduction to OSINT methods and techniques
  • Searching and browsing the surface web
  • Utilizing specialized search engines and directories
  • Exploring social media for OSINT (SOCMINT)
  • Understanding hidden sources
  • Automating OSINT collection and analysis
  • Summary
5

Exploring the Unknown – How Discovery Tools Reveal Hidden Information

  • Introduction to discovery tools
  • Domain and IP address analysis
  • Website reconnaissance – Mastering the unseen layers
  • Document and metadata analysis
  • OSINT data visualization
  • Best practices for using discovery tools
  • Summary
6

From Recon-ng to Trace Labs – A Tour of the Best Open Source Intelligence Tools

  • Recon-ng – A powerful OSINT framework
  • Maltego – Visualizing OSINT data and connections
  • Shodan – The search engine for IoT
  • Trace Labs – A powerful OS designed just for OSINT
  • Overview of the Aircrack-ng suite
  • Additional open source OSINT tools
  • Keeping up with the open source OSINT landscape
  • Summary
7

The Eyes and Ears of Threat Intelligence – How OSINT Helps Mitigate Cyber Risks

  • Introduction to threat intelligence and OSINT
  • Cyber threats and OSINT
  • Cyber threat intelligence platforms and OSINT integration
  • Building an OSINT-driven cyber threat intelligence program
  • Case study: OSINT in a real-world cybersecurity incident
  • Summary
8

Protecting Your Identity and Organization from Cyber Threats

  • Understanding the role of OSINT in protecting your identity and organization
  • Personal digital hygiene and OSINT
  • Assessing and strengthening organizational security with OSINT
  • Identifying and responding to cyber threats such as ransomware
  • Investigating cyber incidents and breaches
  • Summary

1

The Secrets Hiding in Plain Sight – Unveiling the Power of OSINT

  • Gathering OSINT from a Website
2

Invisible and Untouchable – The Importance of Anonymity in OSINT Analysis

  • Using and Checking GHDB
3

The OSINT Toolbox – Methods and Techniques for Gathering and Analyzing Information

  • Scraping and Parsing Web Data
  • Using theHarvester for Data Collection
4

Exploring the Unknown – How Discovery Tools Reveal Hidden Information

  • Performing DNS Enumeration
5

From Recon-ng to Trace Labs – A Tour of the Best Open Source Intelligence Tools

  • Using Recon-ng for Data Harvesting
  • Infrastructure Footprinting a Website
  • Using Shodan
  • Performing Automation Using SpiderFoot

The OSINT Handbook

$167.99

Buy Now

Related Courses

All Courses
scroll to top