Introduction to OSINT
A tailored course introducing the core concepts of Open-Source Intelligence.
40 Hours
Blue Team
40 Hours
Blue Team

ABOUT THE PROGRAM

Being able to gather actionable threat intelligence is an important skill for any cybersecurity team. Collecting evidence-based knowledge about an existing or emerging threat to company assets is integral. Using this information gives companies an advantage and the ability to organize the defensive strategy. For cybersecurity professionals, OSINT training has become an asset to get ahead of incidents and attacks such as data leaks, fraud, or phishing scams. OSINT teams have earned more respect within businesses as preventing these incidents has been seen to help protect customer information and preserve brand trust.

The course covers the following topics:

DON'T TOUCH THIS TAB

It’s important to improve the accordion’s behaviour

Intro
  • Introduction to Intelligence
  • The Intelligence Cycle
  • Intelligence Collection Plan
  • Intelligence Gathering Disciplines
  • Intro to OSINT
  • What is WEBINT
  • Introduction to Search Engines
  • Proxies and Secured Browsing
  • Introduction to Social Media
  • Introduction to HUMINT
  • Introduction to Darknet
  • Intelligence Report
Profiling
  • People Search Engines
  • Understanding Profiling
  • Profiling a Person
  • Username Search
  • Email Leads
  • The Harvester
  • Phone Number Leads
  • Phoneinfoga
Evaluating Web Sites
  • Who.is
  • Evaluating Websites
  • Archives
Search Engines
  • Search Engines Overview
  • Aggregators
  • Google Operators
  • Google Alerts
  • Monitoring Websites Changes
  • Wikileaks
Virtual Humint
  • Virtual HUMINT Overview
  • Understanding Avatars
  • Spotting a Fake Account
  • Avatar Creation
  • Avatar Maintenance
SOCMINT
  • Social Media Overview
  • Investigating a Facebook
  • Investigating Instagram
  • Investigating Twitter
  • Social Media Campaign and Influence
Don't touch this tab
ABOUT CYBERPRO

About CYBERPRO was founded in cooperation with international information security and instruction authorities who bring to Israel world-leading cyber training technologies and a learning experience of the highest standard available today.

The partners include the IITC group which has been training graduates for the high tech industry for over 20 years, and was selected as the training center for the Cisco Company in Israel.

CYBERPRO’s advanced, sought-after training courses in the areas of infrastructures, information security and cyber are world famous. These training courses were developed by some of the best cyber experts in the world, for international security organizations that emphasize the high training capabilities, the professional learning methods and the unique training and practice technologies. Our connection with international groups allows our students to be exposed to unique employment opportunities in Israel and abroad.

The training and learning tracks are all based much hands-on practice and preparation for the industry and profession requirements, so they include technological labs and practice sessions using one of the most advanced simulators in the world.

COURSE INFO
    • Junior OSINT analysts
    • Everyone
    • None
    • Understanding the OSINT world, Terms, and tools of the trade
    • Perform target profiling
    • Using advanced features of search engines
    • Operating avatars

INTERESTED? CONTACT US