OSINT - Open Source Intelligence


Table of Contents


Open-source intelligence (OSINT) covers the techniques and procedures practiced retrieving targeted information from open-source networks containing immense amounts of data.

This course teaches participants how to collect and analyze information using every data source available. Students will be further exposed to collecting information from the Darknet, social networks, and other sources.

How to make the most of this course?

In order to succeed in the course, the following requirements must be met:

  • Participation in all practical laboratories,
  • Self-work at home between lessons,
  • Repetition of materials, self-learning, performing tasks, etc …

In addition to regular classroom studies, the participant is required to practice at least 10 hours a week in order to gain practical experience in the field.
A personal computer suitable for running virtual machines, with an Internet connection
Transition of the scenarios in the Cyberium system

Target audience

This course targets mostly law-enforcement wanting to master the art of finding data around the internet.

  • Intelligence officers
  • Police officers
  • Private/public Investigators
  • Forensics investigators
  • Reporters/Journalists


  • Providing students with an all-source methodology of employing open-source intelligence gathering
  • Discovering techniques and technologies needed to generate highly relevant intelligence
  • Understanding how to collect information from various social networks
  • Exploring the Darknet for information bases


Basic computing skills



In this module, participants will learn the fundamentals of the internet and how everything works and registered. Students will also learn to gather information regarding domains in different parts of the world.

Technical content

  • Networking
    The Internet Structure
    The OSI Model
    The TCP/IP Model
    Network Devices
    Network Protocols
    Proxy Layer
    Virtual Private Network (VPN)
    DNS Leakage Testing
  • Domains and Organizations
    Extracting Details
    Collecting Information
    Reconnaissance of an Organization


Students will get to know practical tools and search engines they will handle to collect data throughout this module. They will deepen their understanding of various information sources and will focus on gathering data from social networks.

Technical content

  • Introduction to OSINT
    Gray areas and Ethics in OSINT
    Building OSINT Plan
    Categorizing and Cataloging Information
    Organizing and Formatting Data
  • OSINT Tools
    Online Tools and Frameworks
    Introduction to Basic Bash Scripting and Automation
    Extracting Information From Major Social Networks
  • Searching for OSINT Information
    Dive into Metadata
    Common Files Metadata
    Web Sites Metadata
    People Search Engines
    Types of OSINT Sources
    Reverse Image Search


Students will become familiar with a wider and more advanced array of OSINT tools and search engines in this module. They will understand how to use metadata and maximize the use of different filtering and customization options for searching. Students will gain the capabilities of identifying further information that may not be disclosed in a standard Google search.

Technical content

Google Search Engine Advanced Search
Geographic Information Gathering
Searching in Different Languages
Building a Google Custom Search Engine
Reverse Image Search
Passive Target Scanners


The following labs are part of the actual BT208 course:
  • Lab 1 Security Procedures
  • Lab 2 Setting your Domain
  • Lab 3 Identifying Attacks
  • Lab 4 Analyzing C&C Communications
  • Lab 5 Reversing Malware Network Behavior
  • Lab 6 Analyzing Network Attacks
  • Lab 7 Working with CVE
  • Lab 8 Working with Firewalls
  • Lab 9 IPv6 Security
  • Lab 10 IDS Configurations
  • Lab 11 Honeypots
  • Lab 12 Securing Linux
  • Lab 13 Securing Windows

Real Cases Studies

Case Study #1 (NS001)
Just before last Christmas and year-end holidays, Citrix announced that its Citrix Application Delivery Controller (ADC) and Citrix Gateway are vulnerable. The vulnerability allows the attacker to execute arbitrary code on the servers. As the Network security expert, your company put you in charge of this case. Use your Network abilities to find the vulnerability and mitigate it
Case Study #2 (NS002)
Kaspersky Lab reports that A massive DNS cache poisoning attack attempting to infect users trying to access websites is currently underway in Brazil. Several large ISPs in the highly connected country have been affected by the attack. You have been tasked to identify details related to the attack to remediate any damage discovered in the identification phase.
Previous slide
Next slide

 Course type

This course is delivered in the following ways:

  • Virtual classroom with proctored labs and scenarios executed in our Cyberarena
  • In situe classroom with proctored labs and scenarios executed in our Cyberarena

All sessions are recorded and attendees can replay them  during 30 days. All course material is electronically made available to the participant.

 Course Group:


 Hands-on / Theory MiX

The following course incorporates a high level of hands-on labs exercises, as well as real life case studies.

1 %
Case Studies


This course helps to prepare the participant to the following certification:

  • C|OSINT (Mcafee)

Required EqUIPMENT

Network connection

As this course extensively uses  a cloud based Learning Management System, including a lab arena, attendees need a stable broadband connection to the Internet.

BYOD – Bring Your Own Device

As it is a very practical course, and in order for the participants to make the most of the course, they need a laptop with the following capabilities:

  • Audio and Video
  • 8 GB RAM
  • 200 GB Disk Space
  • Virtualization capabilities ( supporting latest version of Virtualbox or similar virtual machine application)

And also a Good Headset with Mic

More Details