
Learn Google Dorking, Social Media OSINT, Leaked Databases, Anonymity, Website Recon, Image OSINT & More!
Course Description
This course contains the use of artificial intelligence.
Ever wondered how investigators find information that seems impossible to locate? How do they track digital footprints, uncover hidden connections, and piece together a complete puzzle from scattered clues online? Welcome to Practical OSINT.
This is not just a theoretical course; it is your hands-on guide to mastering the art and science of Open Source Intelligence. In over 9 hours of content, you will move from a complete beginner to a skilled investigator. We start from the very beginning by helping you build a secure, professional investigation lab from scratch using tools like VMWare and Kali Linux.
From there, we dive into the most critical OSINT techniques used by cybersecurity professionals and ethical hackers today. You will learn to think like an investigator, mastering everything from advanced Google Dorking and social media analysis to exploring massive leaked databases and tracking phone numbers. You will not only learn how to find information but also how to protect your own identity using sock puppets , private VPNs , and advanced data hiding techniques like steganography.
If you are ready to stop just using the internet and start understanding it, this course is your first step. Enrol today and start your journey into the fascinating world of Open Source Intelligence.
A Look Inside The Course Curriculum
Here is a breakdown of the exciting skills you will master in each section:
Section 1: Introduction
Get a complete overview of the course structure and meet your instructor, WHO AM I.
Get a complete overview of the course structure and meet your instructor, WHO AM I.
Section 2: Lab Setup
Build your digital detective's toolkit from the ground up. We'll guide you through installing VMWare , setting up Kali Linux , and even show you how to build an ultimate OSINT lab in the cloud.
Build your digital detective's toolkit from the ground up. We'll guide you through installing VMWare , setting up Kali Linux , and even show you how to build an ultimate OSINT lab in the cloud.
Section 3: Search Engines
Go beyond basic searching and master Google Dorking. You'll learn basic people searching techniques , how to discover hidden files and metadata , and even use AI for advanced dorking.
Go beyond basic searching and master Google Dorking. You'll learn basic people searching techniques , how to discover hidden files and metadata , and even use AI for advanced dorking.
Section 4: Emails, Usernames, Passwords
Dive into the world of digital identity. Learn to find emails , trace usernames , and understand the impact of breached credentials and password leaks.
Dive into the world of digital identity. Learn to find emails , trace usernames , and understand the impact of breached credentials and password leaks.
Section 5: Finding and Downloading Leaked Databases
Gain elite skills by learning how to find and download leaked databases. We'll set up a Windows VM and use special tools to explore real-world data breaches from Facebook , Twitter , and LinkedIn.
Gain elite skills by learning how to find and download leaked databases. We'll set up a Windows VM and use special tools to explore real-world data breaches from Facebook , Twitter , and LinkedIn.
Section 6: Phone Numbers OSINT
Turn a single phone number into a trove of information. You'll learn to hunt for numbers , validate them , find the owner's identity , and link them to social media accounts.
Turn a single phone number into a trove of information. You'll learn to hunt for numbers , validate them , find the owner's identity , and link them to social media accounts.
Section 7: People OSINT
Become an expert in finding information about people. We'll cover people search engines , tracing name origins , finding linked social media accounts , political affiliations , and even searching CVs.
Become an expert in finding information about people. We'll cover people search engines , tracing name origins , finding linked social media accounts , political affiliations , and even searching CVs.
Section 8: Social Media OSINT
Learn specific techniques for investigating popular platforms, including Instagram , Facebook , TikTok , Twitter , and LinkedIn. You'll even learn a method to find the IP address of a WhatsApp number.
Learn specific techniques for investigating popular platforms, including Instagram , Facebook , TikTok , Twitter , and LinkedIn. You'll even learn a method to find the IP address of a WhatsApp number.
Section 9: Image OSINT
Unlock the secrets hidden in images. You'll master metadata analysis, reverse image searching , face searching , and using AI for image geolocation.
Unlock the secrets hidden in images. You'll master metadata analysis, reverse image searching , face searching , and using AI for image geolocation.
Section 10: Email Forensics
Learn to analyze emails like a forensic investigator by tracking them and analyzing phishing attempts in a hands-on challenge.
Learn to analyze emails like a forensic investigator by tracking them and analyzing phishing attempts in a hands-on challenge.
Section 11: Files OSINT
Discover how to use file diggers to find documents and other files that aren't easily accessible.
Discover how to use file diggers to find documents and other files that aren't easily accessible.
Section 12: IoT OSINT
Explore the Internet of Things. You'll learn to use Shodan and Censys to find exposed devices, including vulnerable cameras.
Explore the Internet of Things. You'll learn to use Shodan and Censys to find exposed devices, including vulnerable cameras.
Section 13: Website OSINT
Conduct a complete reconnaissance on any website. You'll learn everything from finding the technology stack and subdomains to analyzing security headers , DNS records , and finding historical data.
Conduct a complete reconnaissance on any website. You'll learn everything from finding the technology stack and subdomains to analyzing security headers , DNS records , and finding historical data.
Section 14: Staying Anonymous
Take your privacy to the next level. Learn to use disposable browsers and set up your own free, private, and even unblockable VPN server in the cloud.
Take your privacy to the next level. Learn to use disposable browsers and set up your own free, private, and even unblockable VPN server in the cloud.
Section 15: Hiding Activities, Data & Files
Learn the art of digital concealment. You will master steganography to hide data in images and text , use covert communication techniques , and encrypt your files and disks using professional tools like Veracrypt
Learn the art of digital concealment. You will master steganography to hide data in images and text , use covert communication techniques , and encrypt your files and disks using professional tools like Veracrypt
Similar Courses

Ethically Hack the Planet Part 4

Blockchain Demystified
