Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Osint: Open-Source Intelligence & Socmint: Social Media Int

Posted By: ELK1nG
Osint: Open-Source Intelligence & Socmint: Social Media Int

Osint: Open-Source Intelligence & Socmint: Social Media Int
Published 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.55 GB | Duration: 2h 12m

Learn with me about the various research methodologies through OSINT and in social networks (SOCMINT).

What you'll learn

Learn research techniques and methodologies through OSINT, exclusively in Social Networks (SOCMINT).

Learn how to perform a good securization of your work environment for OSINT and SOCMINT investigations.

Use Google Hacking and other tools to analyze and collect user information on social networks.

Plan, create, analyze and research through the creation of digital avatars or SockPoppets.

Learn how to homologate all the information found in order to find better results.

Through a series of case studies, students will learn how to apply intelligence tools and strategies to investigate.

Learn how to use OSINT tools to investigate social network accounts involved in illicit activities.

Apply OSINT techniques to identify profiles organizing protests and hate speech on Facebook.

Use advanced techniques to de-anonymize users on social networks and anonymous websites.

Requirements

A willingness to learn

To have a computer or portable equipment for the development of the OSINT Laboratory.

No previous programming or computer experience is required.

Proactive attitude and curiosity to learn new techniques and tools.

Basic knowledge of how to use web browsers and search the Internet.

Familiarity with the use of social networks and online platforms.

Critical thinking skills to analyze information and data.

Description

Immerse yourself in the exciting world of OSINT (Open Source Intelligence) and SOCMINT (Social Network Intelligence) through this intensive basic course Level 1, composed of 07 modules designed for intelligence analysts and professionals in Cyber Intelligence and Cybersecurity. This course is categorized as 20% theory and 80% practical, where you will learn the general definitions, contexts, case studies and real situations in each module, which will prepare you to face the most complex challenges of today's digital environment.Each session of the course focuses on a topic that any analyst and researcher should be familiar with, from the investigation of suspicious accounts on social networks to the identification of profiles organizing protests and hate speech on platforms such as Facebook and Twitter. Also using advanced techniques such as Google Dorks, database analysis and de-anonymization tools. In addition, this course focuses exclusively on the use of critical thinking, i.e. the use of logic, reasoning and curiosity, to uncover criminal activities, prevent risks in corporate networks and protect digital security.The course excels in the optimal learning of investigation methodologies on specific targets in OSINT (user names, phone numbers, emails, identification of persons), as well as for the investigation of social networks as part of SOCMINT (Facebook, Instagram and X (former Twitter).

Overview

Section 1: Course Presentation

Lecture 1 Course Presentation

Section 2: Course Introduction

Lecture 2 Intelligence Fundamentals and OSINT in the Modern Context

Section 3: Securing our identity and work environment for OSINT

Lecture 3 Fingerprints and Privacy Protection

Lecture 4 What data do social networks collect from their users?

Lecture 5 Fingerprint Protection and Egosurfing

Lecture 6 Navigators and Essential Tools for OSINT and SOCMINT

Section 4: Indexing levels, search engines and A.I. tools.

Lecture 7 Indexing Levels, Google Hacking and Advanced Resources

Section 5: People Search through OSINT and SOCMINT

Lecture 8 Search and Geolocation (GEOINT) of Persons through OSINT and SOCMINT

Lecture 9 Facial Face Analysis and Research through OSINT and SOCMINT

Section 6: Metadata, Steganography and Reverse Image Searching

Lecture 10 Metadata: Analysis and Extraction for OSINT Research

Lecture 11 Steganography: Hidden Techniques in Digital Research

Lecture 12 Image Intelligence (IMINT)

Section 7: Objectives through OSINT

Lecture 13 OSINT Applied to USERNAMES

Lecture 14 OSINT Applied to EMAILS

Lecture 15 OSINT Applied to TELEPHONES

Section 8: Objectives through SOCMINT

Lecture 16 Definitions, Practices and Management of User Identity (ID) in Social Networks

Lecture 17 SOCMINT Applied to FACEBOOK

Lecture 18 SOCMINT Applied to X (Twitter)

Lecture 19 SOCMINT Applied to INSTAGRAM

Section 9: OSINT/SOCMINT Final Gifts

Lecture 20 Additional gifts OSINT - SOCMINT

Intelligence Analysts,OSINT Researchers,International analysts,Cybersecurity analysts,Cyber intelligence analysts,Police and military agencies,Detectives or private investigators,Lawyers, prosecutors and jurists,General public,Market Intelligence Experts,OSINT and SOCMINT researchers