Companies Home Search Profile

Deep Dive into Open-Source Intelligence

Focused View

Mike Wylie

1:08:48

0 View
  • 001 Beginning your penetration test with OSINT.mp4
    01:02
  • 002 Disclaimer.mp4
    00:48
  • 001 OSINT overview.mp4
    02:38
  • 002 Understanding the value of OSINT.mp4
    02:23
  • 003 Introduction to passive reconnaissance.mp4
    03:08
  • 004 Introduction to active reconnaissance.mp4
    02:39
  • 005 Pros and cons of active and passive reconnaissance.mp4
    02:26
  • 006 Introduction to sources of OSINT.mp4
    04:39
  • 007 Introduction to VPN and anonymizers.mp4
    02:49
  • 001 Introduction to locations and addresses fingerprinting.mp4
    02:55
  • 002 Using breach data for OSINT.mp4
    02:20
  • 003 Introduction to using business records for OSINT.mp4
    03:11
  • 004 Using job posts for OSINT.mp4
    01:54
  • 001 Using OSINT to find employees.mp4
    03:19
  • 002 Using OSINT to find phone numbers.mp4
    02:37
  • 003 Using OSINT to find email addresses.mp4
    02:24
  • 004 Using social media sites for OSINT.mp4
    03:38
  • 005 Extracting metadata from images.mp4
    02:21
  • 001 Introducing domain names and DNS discovery.mp4
    03:45
  • 002 Crawling websites to gather OSINT data.mp4
    03:20
  • 003 Finding deleted information in web archives.mp4
    02:09
  • 004 Introduction to using search engines for OSINT.mp4
    02:11
  • 005 Google hacking or dorking for OSINT.mp4
    02:22
  • 006 Discovering OSINT data in the dark web.mp4
    03:07
  • 007 Introduction to RIRs.mp4
    02:46
  • 001 Where to go with the OSINT data you collect.mp4
    01:57
  • Description


    If you’ve ever engaged in any sort of internet sleuthing—doing research on a company before an interview, looking up someone on social media before you meet them—then you’ve already engaged in some open-source intelligence, or OSINT. OSINT is, essentially, using publicly available information in an intelligence context. In this course, information security expert Mike Wylie shows how to effectively engage in OSINT, from the value of using it, to methods of gathering information. He covers topics like passive reconnaissance vs. active reconnaissance, methods for tracking organizations and employees, and crafting advanced search queries to find sensitive indexed information. If you’re conducting any kind of penetration test, OSINT provides a good foundation to get you started.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 26
    • duration 1:08:48
    • Release Date 2025/02/09

    Courses related to Ethical Hacking