Premium Course

Advanced Open Source Intelligence and Privacy

Expand your Open Source Intelligence skillset and toolbelt to be more efficient and better at conducting your OSINT investigations. This is an advanced approach to Open Source Intelligence with Privacy in mind.

Course Overview

This course is a natural and logical extent of the previous Open source intelligence course where we placed a good foundation to move to more advanced topics concerning OSINT and the Privacy perspective of your digital life.

This course assumes you are familiar with basic search operators and generic OSINT processes (requirements planning, keyword indexing, data collection, data collation, etc.). We also assume you have a solid working knowledge of major web services and social media platforms. We would encourage you to take the course Open Source Intelligence prior to taking this course.

Information and data have never been more accessible in human history than today. As good as this sounds, it is also a rabbit hole into which you can easily fall.

In this course, we will go over the advanced perspective of Open Source Intelligence by covering different approaches and tools while conducting online investigations. We will also cover the Privacy perspective.

You will understand the advanced perspective of Open Source Intelligence and how to be better at Privacy while leading your digital life. Also, you will learn about exciting tools like Recon-ng, Spiderfoot, how to profile a LinkedIn contact, where to look for information on the deep web, and many more. More than often, all that will give you a scare of how much information is exposed on the Internet.

What You Will Learn

Start Learning for as Little As $8 a Month!

Start Your FREE Two Week Trial

We are working day and night to bring you fresh courses every month. And we have brand new features in the works like guided career paths, hands-on labs and experiences, dedicated mentors, cyber range integration and so much more.

Related Courses

Hands-on Password Attacks and Security

Learn how attackers can bypass passwords and how you can prevent them from doing so.

Black Hat Python: Python For Pentesters

Learn how to write python scripts in order to perform pentesting on Windows and Linux Machines

Website Hacking Techniques

Learn web application input validation and error handling testing

Cyberbullying and You: Beating-the-Bully Guidelines

Learn About Cyberbullying, Types of Cyberbullying, and How and Why It Happens

« » page 1 / 11

Subscribe & Start Learning

This course is part of our Premium collection of courses. This package is perfect for professionals and teams looking to take their skills to the next level. Gain access to a wide range of sophisticated courses.

Subscribe & Start Learning

Our Basic plan is perfect for students taking their first steps into leadership, IT management, or cybersecurity. Get comfortable. Feel it out. Learn what you love and what you don’t love. Start learning today with a 7 Day Free Trial!