OSINT Automation

5 Days online

OSINT Automation
1 %
Case Studies

Open-source intelligence (OSINT) Automation covers the techniques and procedures used to retrieve targeted information from open-source networks containing huge amounts of data using automatic tools to achieve maximum results.

This course teaches participants how to collect and analyse information using different tools and creating automation. Participants will be further exposed to collecting information from the Darknet, social networks, and other sources.

The course helps prepare for the certification exams GOSI (SANS) and C|OSINT (Mcafee).

This course is essential for:

This course targets mostly law-enforcement wanting to master the art of finding data around the internet.

  • Threat intelligence analysts
  • Cybersecurity professionals
  • Law enforcement personnel
  • Intelligence officers
  • Private/public Investigators
  • Forensics investigators

Cyberium Arena

Cyberium Arena Logo
The CYBERIUM ARENA is a high-end cybersecurity Learning Management System and Simulator, which trains participants in the use of a wide variety of on-line tools for identifying the nature of a cyber attack and responding quickly and appropriately to prevent damage and disable the attacker.

Real Cases Studies

Case Study #1
A group called "OurMine" took control of the HBO accounts, as well as those for the network's shows, including Game of Thrones. The hackers released episodes of the series before scheduled. The security team was able to trace some of the hackers by tracing one of the attacker's nicknames on Twitter. You are hired to track the group.
Case Study #2
On May 10th, Illinois Air National guard was a victim of information exposure. Personal information of Air Force members was leaked through social media platforms due to a lack of security settings on these websites. An intelligence team was on the case, and you are one of them. Use your OSINT skills and tools to find leads to the incident.
Case Study #3
A hacker nicknamed AlpHaNiX defaced Google, Gmail, YouTube, Yahoo, Apple, and more websites. Cybersecurity researchers found that the hacker used a strategy called DNS cache poisoning. A local security department responded and started to track those domains using their advanced OSINT tools. Help your team mitigate this security incident.
Cliquer ici
Case Study #4
Kaspersky security researcher team reported that the Tor network is currently being used to hide 900 botnet and other illegal hidden services. Police Intelligence unit found information about a criminal who used the "Silk Road" - a popular underground market for merchandise purposes. As one of the intelligence team, track the criminal and to find any connections related to the Darknet.
Cliquer ici
Case Study #5
The infamous hacking group Anonymous vowed an 'Electronic Holocaust' against Israel and promised to erase Israel from cyberspace, leaked credentials to 6000 routers including usernames and passwords. During the attack, the group used many hacktivist community webservers; use your skills, and find related information about the group targets.
Cliquer ici
Previous slide
Next slide

Remain informed about the schedule:

More about:

Open Source Intelligence basic course is the first step to learn about searching targeted informations among the immense data sources available for public through the Web, Darkweb, Social Networks and others sources.

Linux system is essential for OSINT and specifically OSINT Automation. Learn the basement of Linux with this introduction course. Linux can be installed as a sub-system of Windows without affecting your computeur.