Lesson 2: Course Introduction
Hello and welcome to this comprehensive OSINT or Open Source
Intelligence course. With no prior knowledge required, this course
takes you from a beginner to an expert at finding information about
individuals and organizations through open source intelligence. My
name is Zaid.
I'm an ethical hacker, a computer scientist, and the CEO and founder
of the cybersecurity company zSecurity. And I am Saad. I'm an OSINT
investigator, ethical hacker, and a system administrator.
Together, we teamed up to bring you the best Open Source
Intelligence course out there. Combining my experience in ethical
hacking and teaching over a million students worldwide with Saad's
amazing and focused OSINT skills. I worked with Saad on every step
of the way to bring you the best and most practical path to take you
from a beginner to an expert at open source intelligence and get you
certified as an open source intelligence professional.
We're going to do this by taking you through a series of real life
investigations, starting with just a name of an organization or
individual or even an image and using various open source techniques
to gather all kinds of information about this target, such as names,
addresses, location, phone number, connections, and even finding
leaked passwords. As we do this, you're going to be introduced to
different open source intelligence techniques, concepts, and tools.
And just like all of my other courses, this course is highly
practical, but it will not neglect the theory.
So you learn everything through practical hands on examples without
any boring or dry lectures. To achieve this, this course is divided
into a number of sections, each aims to teach you a specific OSINT
technique. We will start with the most important skill as an OSINT
investigator, which is using search engines effectively to find
accurate information about your target.
Then we'll move to Saad's favorite section, the breached and leaked
databases section. And in this section, I'm going to show you how to
discover sensitive information about the target, such as home
addresses, additional email addresses, IP addresses, social security
numbers, passwords, and more. At this stage, you should have a solid
foundation of OSINT, but to truly be an expert, you should be able
to expand on each of these pieces of information and get even more
information from it.
Therefore, to take your skills to the next level, from here onwards,
we are going to have a full section for each OSINT field, such as
social media OSINT, name, username, email, phone, image, location,
and website OSINT. And finally, I'll teach you how you can use
specialized OSINT tools to automatically and easily do everything
that's covered in this course. By the end of this course, you will
have a deep understanding of the individual OSINT fields and
techniques covered and how they tie up together.
So you will be able to start with any piece of information, like a
phone number, email, username, or even an image, not necessarily a
name, and get all sorts of information from it. So this course is
for anybody that is interested in open source intelligence, ethical
hacking, or cybersecurity. This is also the official course to
prepare you for the C-OSINT-P certification.
So once you're done with the course, you'll be able to sit the exam
and become a certified OSINT professional. With this course, you'll
also get 24-7 support, so your questions will be answered in less
than 24 hours. And for more information, make sure you check out the
rest of the curriculum down below..