Osint: Open-Source Intelligence & Socmint: Social Media Int
Published 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.55 GB | Duration: 2h 12m
Published 8/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 3.55 GB | Duration: 2h 12m
Learn with me about the various research methodologies through OSINT and in social networks (SOCMINT).
What you'll learn
Learn research techniques and methodologies through OSINT, exclusively in Social Networks (SOCMINT).
Learn how to perform a good securization of your work environment for OSINT and SOCMINT investigations.
Use Google Hacking and other tools to analyze and collect user information on social networks.
Plan, create, analyze and research through the creation of digital avatars or SockPoppets.
Learn how to homologate all the information found in order to find better results.
Through a series of case studies, students will learn how to apply intelligence tools and strategies to investigate.
Learn how to use OSINT tools to investigate social network accounts involved in illicit activities.
Apply OSINT techniques to identify profiles organizing protests and hate speech on Facebook.
Use advanced techniques to de-anonymize users on social networks and anonymous websites.
Requirements
A willingness to learn
To have a computer or portable equipment for the development of the OSINT Laboratory.
No previous programming or computer experience is required.
Proactive attitude and curiosity to learn new techniques and tools.
Basic knowledge of how to use web browsers and search the Internet.
Familiarity with the use of social networks and online platforms.
Critical thinking skills to analyze information and data.
Description
Immerse yourself in the exciting world of OSINT (Open Source Intelligence) and SOCMINT (Social Network Intelligence) through this intensive basic course Level 1, composed of 07 modules designed for intelligence analysts and professionals in Cyber Intelligence and Cybersecurity. This course is categorized as 20% theory and 80% practical, where you will learn the general definitions, contexts, case studies and real situations in each module, which will prepare you to face the most complex challenges of today's digital environment.Each session of the course focuses on a topic that any analyst and researcher should be familiar with, from the investigation of suspicious accounts on social networks to the identification of profiles organizing protests and hate speech on platforms such as Facebook and Twitter. Also using advanced techniques such as Google Dorks, database analysis and de-anonymization tools. In addition, this course focuses exclusively on the use of critical thinking, i.e. the use of logic, reasoning and curiosity, to uncover criminal activities, prevent risks in corporate networks and protect digital security.The course excels in the optimal learning of investigation methodologies on specific targets in OSINT (user names, phone numbers, emails, identification of persons), as well as for the investigation of social networks as part of SOCMINT (Facebook, Instagram and X (former Twitter).
Overview
Section 1: Course Presentation
Lecture 1 Course Presentation
Section 2: Course Introduction
Lecture 2 Intelligence Fundamentals and OSINT in the Modern Context
Section 3: Securing our identity and work environment for OSINT
Lecture 3 Fingerprints and Privacy Protection
Lecture 4 What data do social networks collect from their users?
Lecture 5 Fingerprint Protection and Egosurfing
Lecture 6 Navigators and Essential Tools for OSINT and SOCMINT
Section 4: Indexing levels, search engines and A.I. tools.
Lecture 7 Indexing Levels, Google Hacking and Advanced Resources
Section 5: People Search through OSINT and SOCMINT
Lecture 8 Search and Geolocation (GEOINT) of Persons through OSINT and SOCMINT
Lecture 9 Facial Face Analysis and Research through OSINT and SOCMINT
Section 6: Metadata, Steganography and Reverse Image Searching
Lecture 10 Metadata: Analysis and Extraction for OSINT Research
Lecture 11 Steganography: Hidden Techniques in Digital Research
Lecture 12 Image Intelligence (IMINT)
Section 7: Objectives through OSINT
Lecture 13 OSINT Applied to USERNAMES
Lecture 14 OSINT Applied to EMAILS
Lecture 15 OSINT Applied to TELEPHONES
Section 8: Objectives through SOCMINT
Lecture 16 Definitions, Practices and Management of User Identity (ID) in Social Networks
Lecture 17 SOCMINT Applied to FACEBOOK
Lecture 18 SOCMINT Applied to X (Twitter)
Lecture 19 SOCMINT Applied to INSTAGRAM
Section 9: OSINT/SOCMINT Final Gifts
Lecture 20 Additional gifts OSINT - SOCMINT
Intelligence Analysts,OSINT Researchers,International analysts,Cybersecurity analysts,Cyber intelligence analysts,Police and military agencies,Detectives or private investigators,Lawyers, prosecutors and jurists,General public,Market Intelligence Experts,OSINT and SOCMINT researchers