If you have ever wondered how somebody is able to find that much information or data about you or your organization, then this is the course for you.
Since Open-Source Intelligence is one of the most crucial phases in any cyberattack, you will find out what the bad guys can learn about you or your company.
Information and data have never been more accessible in human history than today. As good as this sounds, it is also a rabbit hole in which you can easily fall into.
Here is where Open-Source Intelligence or OSINT comes to play. OSINT means many different things to many different people, because of its versatile framework. For most people, it merely means publicly available data from the internet, but it is much more.
In this course, we will go over Open-Source Intelligence from the basics to intermediate things with which you can easily transition yourself into more advanced investigations and upgrade your cybersecurity career.
You will understand what Open-Source Intelligence is and how you can use it to your advantage and protection in a virtual Linux environment. Also, you will learn about exciting tools like theHarvester and Spiderfoot, where to find breach information, what is the structure of the internet, and much more. More often, all that will give you a scare of how much information is exposed on the internet.
Table of contents
- Chapter 1: OSINT Introduction
- Chapter 2: Environment Preparation
- Chapter 3: Notes and Password Managers
- Chapter 4: Search Engines
- Chapter 5: Social Media Intelligence
- Chapter 6: Email Addresses, Usernames, and Images
- Chapter 7: OSINT and IT Systems
- Chapter 8: Data Breaches and Leaks
- Chapter 9: Final Thoughts
- Title: Open Source Intelligence
- Release date: September 2020
- Publisher(s): EC-Council
- ISBN: None
You might also like
Open Source Intelligence Methods and Tools: A Practical Guide to Online Intelligence
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online …
Artificial Intelligence Basics
Artificial intelligence touches nearly every part of your day. While you may initially assume that technology …
The Tao of Open Source Intelligence
The Tao of Open Source Intelligence The Internet has become the defining medium for information exchange …
Black Hat Python, 2nd Edition
When it comes to creating powerful and effective hacking tools, Python is the language of choice …