Companies Home Search Profile

AI for Reconnaissance and OSINT

Focused View

3:05:05

0 View
  • 1 - Introduction and expectations.mp4
    04:43
  • 2 - Disclaimer and legal considerations.mp4
    01:44
  • 3 - What is reconnaissance and OSINT.mp4
    02:22
  • 4 - AI Considerations Use of data accuracy how current is the information.mp4
    02:46
  • 5 - What is a VM Virtual machine.mp4
    06:07
  • 6 - Choosing an OS.mp4
    04:01
  • 7 - Setting up VirtualBox.mp4
    10:34
  • 8 - Sock Puppets Tutorial.mp4
    10:21
  • 9 - Written permissions and scope.mp4
    07:03
  • 10 - Lie to me Talking to GPT to do what we want.mp4
    06:08
  • 11 - Can you jailbreak AI.mp4
    05:49
  • 12 - AI for report writing.mp4
    07:03
  • 13 - Web scraper.mp4
    04:23
  • 14 - Darkweb AI tools overview.mp4
    06:01
  • 15 - Using AI to write programs for you.mp4
    05:20
  • 16 - Using AI to understand code.mp4
    02:05
  • 17 - What is social engineering SE.mp4
    12:26
  • 18 - AI Social Engineering example.mp4
    15:59
  • 19 - AI Voice.mp4
    08:21
  • 20 - Deepfakes.mp4
    04:57
  • 21 - Having AI outline our phishing attack.mp4
    10:37
  • 22 - AI Reverse image.mp4
    05:06
  • 23 - AI Geo location.mp4
    06:38
  • 24 - Image enhancement.mp4
    06:30
  • 25 - AI generated photos.mp4
    04:35
  • 26 - AI generated voice.mp4
    03:54
  • 27 - AI Generated video.mp4
    03:44
  • 28 - AI generated text.mp4
    03:48
  • 29 - Can I fully automate X.mp4
    06:16
  • 30 - Are there more tools.mp4
    02:37
  • 31 - Resources.mp4
    03:07
  • Description


    a look at using AI

    What You'll Learn?


    • About AI
    • Use of AI for reconnaissance
    • use of AI for OSINT
    • Ethical considerations

    Who is this for?


  • Anyone interested in leveraging AI for reconnaissance and for OSINT
  • What You Need to Know?


  • Internet connection
  • More details


    Description

    In the rapidly evolving field of cybersecurity, understanding the power of artificial intelligence in reconnaissance and Open Source Intelligence (OSINT) is crucial. This online course is designed for all levels of expertise, from beginners to seasoned professionals, who are eager to enhance their skills with cutting-edge AI tools specifically in the context of reconnaissance and OSINT applications.

    Course Highlights:

    • Sock Puppets: Learn how to create and manage anonymous online personas for effective intelligence gathering.

    • Virtual Machines (VMs): Explore the use of VMs for safe and isolated reconnaissance activities.

    • Photo Analysis: Understand techniques for analyzing images to extract valuable information.

    • AI Voice and Detection: Discover tools for voice synthesis and detection to enhance social engineering tactics.

    • Web Scraping (Basic): Get hands-on experience with basic web scraping techniques to gather data from various sources.

    • Social Engineering: Delve into AI-assisted social engineering strategies to improve your reconnaissance efforts.

    • Report Writing and Templates with AI: Learn how to efficiently compile your findings into professional reports using AI-generated templates.

    • Jailbreaking and Lying to AI: Explore advanced techniques for manipulating AI models to bypass restrictions and extract information.

    • Phishing with AI: Understand the ethical implications and methodologies of using AI in phishing simulations.

    Prerequisites: This course is not recommended for those who have completed previous courses on similar topics, as many of the tools and techniques covered may overlap. If you're seeking a comprehensive introduction to ethical hacking or OSINT, please consider enrolling in my other courses.

    Join us to unlock the potential of AI in reconnaissance and OSINT, and stay ahead in the ever-changing landscape of cybersecurity!

    Who this course is for:

    • Anyone interested in leveraging AI for reconnaissance and for OSINT

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 31
    • duration 3:05:05
    • Release Date 2024/11/21

    Courses related to Ethical Hacking

    Subtitle
    Command and Control with Merlin
    Pluralsight Zach Roof
    Zach Roof
    Command and Control with Merlin
    27:28
    English subtitles
    02/25/2023
    Subtitle
    Practical Networking
    Pluralsight Ben Piper
    Ben Piper
    Practical Networking
    2:54:31
    English subtitles
    07/22/2023