OSINT - Open Source Intelligence
Table of Contents
Open-source intelligence (OSINT) covers the techniques and procedures practiced retrieving targeted information from open-source networks containing immense amounts of data.
This course teaches participants how to collect and analyze information using every data source available. Students will be further exposed to collecting information from the Darknet, social networks, and other sources.
How to make the most of this course?
In order to succeed in the course, the following requirements must be met:
- Participation in all practical laboratories,
- Self-work at home between lessons,
- Repetition of materials, self-learning, performing tasks, etc …
In addition to regular classroom studies, the participant is required to practice at least 10 hours a week in order to gain practical experience in the field.
A personal computer suitable for running virtual machines, with an Internet connection
Transition of the scenarios in the Cyberium system
This course targets mostly law-enforcement wanting to master the art of finding data around the internet.
- Intelligence officers
- Police officers
- Private/public Investigators
- Forensics investigators
- Providing students with an all-source methodology of employing open-source intelligence gathering
- Discovering techniques and technologies needed to generate highly relevant intelligence
- Understanding how to collect information from various social networks
- Exploring the Darknet for information bases
Basic computing skills
In this module, participants will learn the fundamentals of the internet and how everything works and registered. Students will also learn to gather information regarding domains in different parts of the world.
The Internet Structure
The OSI Model
The TCP/IP Model
Virtual Private Network (VPN)
DNS Leakage Testing
- Domains and Organizations
Reconnaissance of an Organization
Students will get to know practical tools and search engines they will handle to collect data throughout this module. They will deepen their understanding of various information sources and will focus on gathering data from social networks.
- Introduction to OSINT
Gray areas and Ethics in OSINT
Building OSINT Plan
Categorizing and Cataloging Information
Organizing and Formatting Data
- OSINT Tools
Online Tools and Frameworks
Introduction to Basic Bash Scripting and Automation
Extracting Information From Major Social Networks
- Searching for OSINT Information
Dive into Metadata
Common Files Metadata
Web Sites Metadata
People Search Engines
Types of OSINT Sources
Reverse Image Search
Students will become familiar with a wider and more advanced array of OSINT tools and search engines in this module. They will understand how to use metadata and maximize the use of different filtering and customization options for searching. Students will gain the capabilities of identifying further information that may not be disclosed in a standard Google search.
Google Search Engine Advanced Search
Geographic Information Gathering
Searching in Different Languages
Building a Google Custom Search Engine
Reverse Image Search
Passive Target Scanners
- Lab 1 Security Procedures
- Lab 2 Setting your Domain
- Lab 3 Identifying Attacks
- Lab 4 Analyzing C&C Communications
- Lab 5 Reversing Malware Network Behavior
- Lab 6 Analyzing Network Attacks
- Lab 7 Working with CVE
- Lab 8 Working with Firewalls
- Lab 9 IPv6 Security
- Lab 10 IDS Configurations
- Lab 11 Honeypots
- Lab 12 Securing Linux
- Lab 13 Securing Windows
Real Cases Studies
This course is delivered in the following ways:
- Virtual classroom with proctored labs and scenarios executed in our Cyberarena
- In situe classroom with proctored labs and scenarios executed in our Cyberarena
All sessions are recorded and attendees can replay them during 30 days. All course material is electronically made available to the participant.
Hands-on / Theory MiX
The following course incorporates a high level of hands-on labs exercises, as well as real life case studies.
This course helps to prepare the participant to the following certification:
- GOSI (SANS)
- C|OSINT (Mcafee)
As this course extensively uses a cloud based Learning Management System, including a lab arena, attendees need a stable broadband connection to the Internet.
BYOD – Bring Your Own Device
As it is a very practical course, and in order for the participants to make the most of the course, they need a laptop with the following capabilities:
- Audio and Video
- 8 GB RAM
- 200 GB Disk Space
- Virtualization capabilities ( supporting latest version of Virtualbox or similar virtual machine application)
And also a Good Headset with Mic