OSINT – Open Source Intelligence Training Course Free

Aircraft, phone number, user, document, images, and other OSINT topics.

This course goes from scratch to advanced; it covers the most critical aspect of OSINT (open-source intelligence). The OSINT plays a vital role in the ethical hacking/ Penetration testing process; hence this program is equally essential for intelligence officers, ethical hackers, marketers, HR, and cybersecurity professionals.

It covers image, phone number, people, company, documents, and aircraft OSINT. You will learn the steps to setup Metagoofil, Metaforger, GIMP, and GMIC in the Kali Linux. Apart from Kali Linux, you will get hands-on experience in search engine research; we will focus on Google operators, Yandex, Tineye, and others for reverse image search.

You will also get a chance to access the private OSINT professionals community on Facebook; you will even understand Metadata and Exif’s concept. Open source intelligence is all about using public sources to gather, analyze and report actionable information. It also covers the concept of data and the steps to process the data to convert them into information.

Irfan Shakeel
Irfan Shakeel, the founder of ehacking project, he also hosts cyber security training classes at EH Academy. He has discovered many vulnerabilities in the famous platforms (like Google, Dailymotion, Harvard University & etc.). He specializes in Network hacking, VoIP pentesting & digital forensics. He is the author of the book title “Hacking from Scratch”.

Most Popular

OSINT WIFI Tutorial: Track People using WiFi via Wigle

Due to the drastic growth of internet access, Wi-fi networks have become progressively popular. Wi-fi technologies link to the network topologies allows users to...

Why Attack Surface Analysis is a Core of Cybersecurity?

The pandemic of COVID-19 has changed the world dramatically. Almost all everyday actions have gone online: people work from home, students attend lectures through...

The Attack Surface Mapping guide for Ethical Hackers

This article explains how to map the attack surface in a precise and realistic way. An attack surface aims to figure out which areas...

Addressing Myths About Online Casinos & Security

Many people carry a perception that online casinos inherently involve a security risk. The sense is that these sites can be somehow “sketchy” or...