OSINT Professional Course

Open Source Intelligence Training • 144 Lessons • 30 Sections

Progress: 0/144 completed

Course Introduction

15 min Lesson 2 Introduction to Open Source Intelligence
LESSON 2

Lesson 2: Course Introduction

Hello and welcome to this comprehensive OSINT or Open Source Intelligence course. With no prior knowledge required, this course takes you from a beginner to an expert at finding information about individuals and organizations through open source intelligence. My name is Zaid.

I'm an ethical hacker, a computer scientist, and the CEO and founder of the cybersecurity company zSecurity. And I am Saad. I'm an OSINT investigator, ethical hacker, and a system administrator.

Together, we teamed up to bring you the best Open Source Intelligence course out there. Combining my experience in ethical hacking and teaching over a million students worldwide with Saad's amazing and focused OSINT skills. I worked with Saad on every step of the way to bring you the best and most practical path to take you from a beginner to an expert at open source intelligence and get you certified as an open source intelligence professional.

We're going to do this by taking you through a series of real life investigations, starting with just a name of an organization or individual or even an image and using various open source techniques to gather all kinds of information about this target, such as names, addresses, location, phone number, connections, and even finding leaked passwords. As we do this, you're going to be introduced to different open source intelligence techniques, concepts, and tools. And just like all of my other courses, this course is highly practical, but it will not neglect the theory.

So you learn everything through practical hands on examples without any boring or dry lectures. To achieve this, this course is divided into a number of sections, each aims to teach you a specific OSINT technique. We will start with the most important skill as an OSINT investigator, which is using search engines effectively to find accurate information about your target.

Then we'll move to Saad's favorite section, the breached and leaked databases section. And in this section, I'm going to show you how to discover sensitive information about the target, such as home addresses, additional email addresses, IP addresses, social security numbers, passwords, and more. At this stage, you should have a solid foundation of OSINT, but to truly be an expert, you should be able to expand on each of these pieces of information and get even more information from it.

Therefore, to take your skills to the next level, from here onwards, we are going to have a full section for each OSINT field, such as social media OSINT, name, username, email, phone, image, location, and website OSINT. And finally, I'll teach you how you can use specialized OSINT tools to automatically and easily do everything that's covered in this course. By the end of this course, you will have a deep understanding of the individual OSINT fields and techniques covered and how they tie up together.

So you will be able to start with any piece of information, like a phone number, email, username, or even an image, not necessarily a name, and get all sorts of information from it. So this course is for anybody that is interested in open source intelligence, ethical hacking, or cybersecurity. This is also the official course to prepare you for the C-OSINT-P certification.

So once you're done with the course, you'll be able to sit the exam and become a certified OSINT professional. With this course, you'll also get 24-7 support, so your questions will be answered in less than 24 hours. And for more information, make sure you check out the rest of the curriculum down below..