% Off Udemy Coupon - CourseSpeak

Learn OSINT (Open-source Intelligence) From Scratch

Discover emails, passwords, online accounts, locations, phone numbers and much more | No Prior Knowledge Required

$12.99 (94% OFF)
Get Course Now

About This Course

<div>Zaid and Saad tamed up to bring you the best OSINT course out there and get you certified as an Open Source Intelligence Professional. Combining Zaid's experience in ethical hacking and teaching over 1 million students world wide, with Saad's amazing and focused OSINT skills.</div><div><br></div><div>This course will teach you how to use Open Source Intelligence (OSINT) to gather information about anything. With no prior knowledge required, this course takes you from a beginner to an expert at performing advanced OSINT techniques, giving you the ability to gather information about individuals, companies, email addresses, phone numbers, social media accounts, physical locations, images and more.</div><div><br></div><div>Just like our other courses, this course is highly practical, but it won't neglect the theory. We'll start with the basics of open-source intelligence, then we'll dive and start using OSINT to investigate people, companies and individual pieces of information straight away. You'll learn everything by example, by gathering real information online — no boring dry lectures. By the end of the course, you will be an expert in open-source intelligence (OSINT).</div><div><br></div><div>To achieve this the course is divided into a number of sections,&nbsp; each aims to teach you a specific OSINT technique. You'll first learn what is OSINT, why it is used, and who uses it. Then you'll learn how to use OSINT to find real information about targets, starting with just one piece of information (such as a name, email, username) and discovering all kinds of linked information such as hidden accounts, phone numbers, social media presence, leaked information, passwords and much more.</div><div><br></div><div>As we proceed, you will be introduced to different OSINT methodologies, tools, and techniques. Everything will be taught through examples and hands-on practicals—no useless or boring lectures!</div><div><br></div><div><span style="font-size: 1rem;">All the techniques in this course are practical and work against real targets, you'll understand how to investigate each piece of information individually. Therefore by the end of the course you'll be able to start with any piece of information and carry out a full investigation to uncover rated data and information.</span></div><div><br></div><div>By the end of the course, you'll be able to modify these techniques to launch more sophisticated OSINT investigations and adapt them to suit different situations and scenarios.</div><div><br></div><div>Here are some of the topics that will be covered in the course:</div><div><ul><li><span style="font-size: 1rem;">People OSINT</span></li><li><span style="font-size: 1rem;">Username OSINT</span></li><li><span style="font-size: 1rem;">Phone OSINT</span></li><li><span style="font-size: 1rem;">SOCMINT - Social Media OSINT</span></li><li><span style="font-size: 1rem;">Maps and Satellite OSINT.</span></li><li><span style="font-size: 1rem;">Image OSINT</span></li><li><span style="font-size: 1rem;">Website OSINT</span></li><li><span style="font-size: 1rem;">Search engines operators.</span></li><li><span style="font-size: 1rem;">Custom search operators.</span></li><li><span style="font-size: 1rem;">Searching with AI</span></li><li><span style="font-size: 1rem;">Setting up an OSINT virtual machine</span></li><li><span style="font-size: 1rem;">Creating a Sock Puppet account</span></li><li><span style="font-size: 1rem;">Searching for leaked / breached databases</span></li><li><span style="font-size: 1rem;">Downloading leaked / breached databases</span></li><li><span style="font-size: 1rem;">Leveraging leaked / breached databases to find sensitive information.</span></li><li><span style="font-size: 1rem;">Finding passwords in leaked / breached databases.</span></li><li><span style="font-size: 1rem;">Scraping &amp; downloading posts from Instagram, Tiktok, Snapchat, etc.</span></li><li><span style="font-size: 1rem;">Finding hidden content, posts, comments, accounts, etc.</span></li><li><span style="font-size: 1rem;">Discovering linked usernames, accounts, phone numbers, emails, etc.</span></li><li><span style="font-size: 1rem;">Tracking phone numbers, images, online accounts, etc.</span></li><li><span style="font-size: 1rem;">Investigating locations with various maps and satellite services</span></li><li><span style="font-size: 1rem;">Discovering subdomains, hidden website owners, linked websites and more!</span></li><li><span style="font-size: 1rem;">Using people search engines</span></li><li><span style="font-size: 1rem;">Reverse image search</span></li><li><span style="font-size: 1rem;">Geolocation of photos</span></li><li><span style="font-size: 1rem;">AI image tracking</span></li><li><span style="font-size: 1rem;">Manual image tracking</span></li><li><span style="font-size: 1rem;">Facial recognition</span></li><li><span style="font-size: 1rem;">Voter records lookup</span></li><li><span style="font-size: 1rem;">Searching Wedding/Baby/Gift registries</span></li><li><span style="font-size: 1rem;">OSINT automation.</span></li><li><span style="font-size: 1rem;">Writing OSINT reports.</span></li></ul></div><div><span style="font-size: 1rem;"><br></span></div><div><span style="font-size: 1rem;">You'll use the following tools to achieve the above:</span></div><div><ul><li><span style="font-size: 1rem;">Tracelabs OSINT VM</span></li><li><span style="font-size: 1rem;">True People search engine.</span></li><li><span style="font-size: 1rem;">Phoneinfoga</span></li><li><span style="font-size: 1rem;">Sherlock</span></li><li><span style="font-size: 1rem;">Spiderfoot</span></li><li><span style="font-size: 1rem;">Ghunt</span></li><li><span style="font-size: 1rem;">Httprobe</span></li><li><span style="font-size: 1rem;">Sublist3r</span></li><li><span style="font-size: 1rem;">Instaloader</span></li><li><span style="font-size: 1rem;">WPScan</span></li><li><span style="font-size: 1rem;">Google Dorks</span></li><li><span style="font-size: 1rem;">DorkGPT</span></li><li><span style="font-size: 1rem;">Google Hacking Database GHDB</span></li><li><span style="font-size: 1rem;">Exif Tool</span></li><li><span style="font-size: 1rem;">DeHashed</span></li><li><span style="font-size: 1rem;">LeakPeek</span></li><li><span style="font-size: 1rem;">Breach Directory</span></li><li><span style="font-size: 1rem;">Have I Been Pwned</span></li><li><span style="font-size: 1rem;">IntelX Tools</span></li><li><span style="font-size: 1rem;">VirtualBox</span></li><li><span style="font-size: 1rem;">True People Search</span></li><li><span style="font-size: 1rem;">OSINT Industries</span></li><li><span style="font-size: 1rem;">CyberChef</span></li><li><span style="font-size: 1rem;">OpenStreetMap (OSM)</span></li><li><span style="font-size: 1rem;">DNSDumpster</span></li><li><span style="font-size: 1rem;">Wayback Machine</span></li><li><span style="font-size: 1rem;">FOCA</span></li><li><span style="font-size: 1rem;">GeoSpy</span></li><li><span style="font-size: 1rem;">Osintracker</span></li></ul></div><div><br></div><div>Other topics:</div><div><span style="font-size: 1rem;">Linux basics</span></div><div><span style="font-size: 1rem;">Using the Linux terminal</span></div><div><span style="font-size: 1rem;">Linux commands.</span></div><div><span style="font-size: 1rem;">Installing virtual machines</span></div><div><br></div><div>With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&amp;A section and we'll respond to you within 15 hours.</div><div><br></div><div>Check out the curriculum and the course teaser for more info!</div><div><br></div><div>Notes:</div><div><span style="font-size: 1rem;">This is the official course to prepare you for the C|OSINT|P (certified OSINT professional) certification.</span></div><div><span style="font-size: 1rem;">This course is created for educational purposes only. Everything done through it is legal and relies on information that is publicly available on the internet.</span></div>

What you'll learn:

  • 140+ lectures teaching you how gather info about anything using OSINT
  • Real-life practical OSINT investigations
  • Discover social media profiles, passwords, linked accounts, phone numbers, addresses, documents & much more
  • No prior knowledge required
  • Use AI for OSINT
  • Find & download leaked databases
  • Find passwords, phone numbers, addresses and more
  • Find hidden profiles, accounts, deleted content, comments, tweets and more!
  • Discover accounts linked to a phone number, email, name, alias, email and more!
  • Find addresses linked to a person, phone number, email....etc
  • Find phone numbers linked to people, online accounts, emails and more
  • Scrape & download info from social media profiles such as Instagram, TikTok and more!
  • Discover public cameras
  • Utilize search engines effectively to find sensitive information
  • Use custom search engine operators
  • Find personal/business email addresses
  • Find personal/business phone numbers
  • Create a covert account
  • Download & search Facebook & Twitter leaks
  • Download & search LinkedIn & SnapChat data breaches
  • Extract information from images
  • Uncover information linked to emails & phone numbers
  • Discover sensitive information about people
  • Linux basic commands
  • Use mapping tools and geolocation techniques
  • Google dorking
  • Track phone numbers
  • Use facial recognition to track individuals across the internet
  • Use satellite imagery to track images, individuals and locations
  • Geolocate images using OSM, AI and more!
  • Discover website owner's information even if it is hidden
  • Discover subdomains
  • Extract useful website information through DNS records
  • Find linked websites that have the same owner
  • Track website's changes over time
  • Access voter records
  • Access wedding/baby/gift registries
  • OSINT Flowcharts
  • Automate OSINT tasks
  • Discover hidden and sensitive files on websites
  • Write OSINT reports