Corporate Reconnaissance with Open-Source Intelligence: Examining the First Phase in the Cyber Kill Chain Framework
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 58m | 478 MB
Instructor: Tino Šokić
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 58m | 478 MB
Instructor: Tino Šokić
This course presents a wide range of open-source intelligence (OSINT) reconnaissance techniques that you can use to prevent attacks in the first phase of the cyber kill chain. Join instructor Tino Šokić as he demystifies the essentials of OSINT, the cyber kill chain framework, and operational security for conducting effective OSINT investigations.
Discover commonly used OSINT tools, learn how to access the deep and dark web dimension of OSINT, and get tips for documenting your OSINT findings and presenting them to your clients or customers. Along the way, Tino demonstrates how a real-world reconnaissance operation actually works, and shares key considerations for the future of OSINT.
Learning objectives
- Explain how open-source intelligence (OSINT) fits into reconnaissance as the first phase in the cyber kill chain framework.
- Compare various OSINT tools and techniques to find the best methods for different reconnaissance scenarios in the context of the cyber kill chain.
- Discover critical information from deep and dark web sources while maintaining ethical and legal standards.
- Examine an online attack surface of a company by focusing on corporate reconnaissance to gather competitive intelligence and identify potential security vulnerabilities.
- Formulate comprehensive intelligence reports by organizing, synthesizing, and disseminating OSINT findings.