Open Source Intelligence (OSINT) Training
This course is designed for professionals who want to enhance their investigative and research skills using OSINT methods. Whether you’re tracking digital threats, conducting background research, or gathering intelligence, this course will equip you with the tools and knowledge to operate confidently in the open-source landscape.
Aims
Include a list of itemThis course aims to assist the learner develop their knowledge, skills and abilities to assist them: s to support the central theme of your page. Bulleted lists are a great way to parse information into digestible pieces.
-
Collect and analyse publicly available information to generate actionable intelligence.
-
Use open source tools, techniques, and search strategies effectively and ethically.
-
Protect personal and operational security while conducting online investigations.
-
Understand and apply OSINT in practical scenarios across cybersecurity, law enforcement, and research contexts.
Course Content
-
-
Welcome
-
Next Steps
FREE PREVIEW -
Course Disclaimer
FREE PREVIEW -
Open-Source Intelligence Course List of Contents
-
Lecture One What is Open Source Intelligence?
FREE PREVIEW -
Lecture Two The Intelligence Cycle
-
Lecture Three Data
-
Lecture Three Support Material
-
Lecture Four Ethics
-
Lecture Four Support Material
-
Lecture Five Internet Protocol
-
Lecture Five Support Material
-
Lecture Six Types of IP addresses
-
Lecture Seven Virtual Private Networks (VPN)
-
Lecture Seven Support Material
-
Lecture Eight Part One Source Code
-
Lecture Eight Part Two Source Code
-
Lecture Eight Support Material
-
Lecture Nine Part One Firewalls
-
Lecture Nine Part Two Firewalls and Internet Censorship
-
Lecture Nine Support Material
-
Lecture Ten Part One Encryption and Comms Sec
-
Lecture Ten Part Two Encryption and Comms Sec
-
Lecture Ten Support Material
-
Lecture Eleven Part One Trackers and Blockers
-
Lecture Eleven Part Two Trackers and Blockers
-
Lecture Eleven
-
Lecture Twelve Cookies
-
Lecture Thirteen Data Mining
-
Lecture Thirteen
-
Lecture Fourteen Part One Geolocation, Geotagging and EXIF data
-
Lecture Fourteen Part Two Geolocation, Geotagging and EXIF data
-
Lecture Fourteen Support Material
-
Lecture Fifteen Part One Advanced Searches
-
Lecture Fifteen Part Two Advanced Searches
-
Lecture Fifteen Support Material
-
Lecture Sixteen Part One Cybercrime
-
Lecture Sixteen Part Two Cybercrime
-
Lecture Sixteen Support Material
-
Lecture Seventeen Crime on Social Media
-
Lecture Eighteen Social media and network analysis
-
Lecture Eighteen Support Material
-
Lecture Nineteen Sentiment and Image Analysis
-
Lecture Nineteen Support Material
-
Lecture Twenty Fake News
-
Lecture Twenty Support Material
-
Lecture Twenty One False Personna
-
Lecture Twenty One Support Material
-
Lecture Twenty Two Artificial Intelligence
-
Lecture Twenty Two Support Material
-
Course Conclusion
-

About this course
- $1,000.00
- 51 lessons
- 3 hours of video content
Coming soon!
Add your email to the mailing list to get the latest updates.