The Secret of OSINT
What will your gain from the course?
This story happened to me a few years ago.
I was really angry and indignant when discovered that one of my feature articles was stolen and published under a false name on a website. Fortunately, the website had very detailed contact data – the editor-in-chief and journalists’ names, emails, phone numbers and even physical address of their office.
I sent an email to the editor but got no answer. So I start to check other contacts and it appeared that all of them –totally! — was fake… <read more>
What's in the Course?
Information is the king today. If you have it, you’ll be able to make the right decisions and win. If not, you will be taken advantage of and lose. It relates to any area of your life – business, work, family, relationship and, especially, security.
Wouldn’t it be dreamy if you were able to get the truth about your business partners? Spot scammers before they have ripped you off? Locate a bully that pursues you or your child in social media? Find a criminal? Be sure a person you speak with does not lie to you? Get the darkest secrets of a company that deceived you? Gain information that helps you to get the job of your dream or get along with your boss? Have powerful leverage in negotiations? And even find your college sweetheart you’ve never met since then?
You’ll be able to do every item of the list and even much more after taking my course. And, more of that, you’ll be able to get paid good money for finding information of such kind for other people/companies who don’t know the OSINT secrets revealed in this course.
And what are these techniques exactly? Here you go.
Five staps to James Bond
Going undercover
Section 1 is about your security, privacy and anonymity. You’ll know how you can be (and, in fact, constantly is) tracked on the Internet and how to prevent it. You’ll find out why a VPN does not provide you with total anonymity and what to do with this issue. Then we’ll learn how to harden your browser and test it for privacy so you can be sure you’re protected from adversaries’ eyes. You’ll get a pack of tools and tricks that will let you feel sure no one is after you. You’ll set up search engines that don’t track you. And ultimately, have a browser James Bond would appreciate.
Recruiting Intelligence Sources
In Section 2 you’ll get to know with the OSINT investigation chain and learn to use it. We’ll consider how to obtain plenty of valued information about a target having only its IP- address, name, email, phone number or image. You’ll gain various techniques for analyzing, tracing and combining these items to dig out the data hidden in them. And more of that, you’ll be able to detect a faked image with digital forensics tools. Of course, any theory means almost nothing without practice, so I’ll demonstrate a real-life example of catching a gang of scammers with these techniques for you to be sure they really work.
How to make search engines talk
In Section 3 you’ll learn how to ask search engine questions they won’t able to ignore. You’ll get to know with a special search engine language – advanced operators — and be able to gain information that 98% of people will never do. And it’s not only about Google. You’ll also learn some special search engines that can be used to find the info you look for. And you’ll even know how to recover information from websites that were closed and destroyed years ago. Of course, you’ll find an example of using these techniques in a real-life situation. This time you’ll know the compelling story of spotting the bully in social media and revealing two-tongue politician.
How to interrogate social networks
In Section 4 you’ll learn the tools and techniques to extract flood of information about your targets, be it a person or a company, from social networks. We’ll discuss Twitter advanced search operators and you’ll be surprised how much information can be obtained with them. You’ll learn how to dig into LinkedIn deeply. Find out how to reveal the real name of a person hidden under a nickname account. Know what valued data you can from Facebook even after they blocked its Graph Search. Finally, you’ll get the story that demonstrates how to spot a criminal using his pictures on Instagram. And there is even more stunning case: how internet-trolls that interfered in the US election were spotted on Twitter. And you’ll be able to use this strategy to discover any group of trolls.
Loading heavy guns
Finally, in Section 5, you’ll get to know with the favorite tool of most OSINT investigators – Maltego. We’ll combine the OSINT investigation chain we’ve learned in Section 1 with the powerful capabilities of Maltego. You’ll know how to build connections between IP address, domain names, persons’ names, emails and phone numbers to create visual graphs like those you see in popular movies about police or intelligence work. Thus, your ability to conduct investigations will skyrocket and helps you to get insights by seeing the big picture. And you’ll be able to get a bunch of information about a person or a company in a couple of clicks.
Congratulation!!! Your are James Bond of Internet!!!
Who this course is for
This course is for everyone who wants to get more information to make the right decisions, avoid losses and secure their assets. Creating his course, I had in mind in the first place security professionals: private investigators, law enforcement officers, journalists, HRs, penetration testers, ethical hackers, state and business intelligence specialists and so on.
But in reality, I’m sure that everyone needs to have these skills because OSINT techniques will help anyone in the usual life. For example, these techniques will be extremely helpful when you try to hire a nurse for your kid or starving to get a job in the company of your dream. In first case OSINT techniques will help to avoid hiring a bad person; in the second they’ll raise your odds to get the job.
That’s why I aimed to create a unique OSINT course. Firstly, I left aside the dullest theoretical parts to make the course powerfully hands-on. That means you can use all these techniques right after you’ve learned them. Secondly, the course does not require any special IT knowledge. Unlike other OSINT courses, it even does not require learning Linux. I specially picked up the tools that are available for anyone but at the same time are extremely effective.
Learn how to conduct investigations on the Internet and discover the darkest secrets your adversaries don't want you to know!