We may earn an affiliate commission when you visit our partners.
Jeff Minakata

In this course we will be continuing our learning and understanding of OSINT. If you took my previous course ( OSINT: Open-Source Intelligence For hackers, investigators, and everyone else) then this will be a continuation from that. In this course we continue learning about additional tools along with the how and why. We create burner accounts for OSINT, criminal background checks, vehicle lookups, using Linux for OSINT, and much more. There is a growing need for OSINT skills as there is a increase in cyber crime, fraud, misinformation, disinformation campaigns, etc.

Read more

In this course we will be continuing our learning and understanding of OSINT. If you took my previous course ( OSINT: Open-Source Intelligence For hackers, investigators, and everyone else) then this will be a continuation from that. In this course we continue learning about additional tools along with the how and why. We create burner accounts for OSINT, criminal background checks, vehicle lookups, using Linux for OSINT, and much more. There is a growing need for OSINT skills as there is a increase in cyber crime, fraud, misinformation, disinformation campaigns, etc.

This course is ideal for hackers, pentesters, investigators, HR, and everyone else. I appreciate that you are taking a look and hopefully joining this course. I work hard to provide great content and support. Feel free to check out my original OSINT course if you haven't already and preview the videos and read the reviews. This course is built and expands your knowledge from the previous OSINT 1 course as we dive deeper into the amazing world of OSINT (Open source intelligence) as we continue our journey.

before, during and even after you take the course I will do my best to help you out with any questions that you have.

Happy hunting.

FYI, a reminder: I not anyone that is a part of DGS has any affiliation with any of the vendors, software manufactures, or programmers in this course.

Enroll now

What's inside

Learning objective

In this course students will learn more advance osint techniques, learn about social engineering to aid in osint investigations and more

Syllabus

Introduction

Welcome to the OSINT 2 course, this is a continuation to the previous course that I have on Udemy. If you took that course or have a basic background in OSINT welcome. This course is designed to build off of that knowledge.

Read more

Yes, this is a quick disclaimer for the course.

Setting up our virtual machine with Virtualbox
CSI Linux
-Virtual machine clean, VPN, Alias, OS update

In this video we go over a quick OSINT checklist.


Collect information-Analyze information-Verify information-Record information.

Website crawling tools

It's time for some deep magic information gathering with Dmitry.

In this video we dig some domains with Dig.

Emails, sub domains, we can find them all with the harvester.

wget
Additional content: Dnslytics
URL Scan IO
Domain Codex and Securitytrails
Subdomainfinder
Social engineering

In this video we discuss how social engineering (SE) can be used in OSINT.

Tracking URLS with Grabify.

This was a clever technique that was discussed on the Privacy and Security podcast.

In this video we take a look at spoofing emails and why.

https://www.biggerpockets.com/rei/california-real-estate-public-records/

In this video we talk about how to find out who owns that home.

Redfin and Zillow
Encryption

In this video we take a look at secure ways to send for file transfers.

In this video we take a look at the encryption tool Veracrypt.

In this video we talk about what a hashed password is and how to unhash it.

In this video we take a look at a live keylogger and keepass and why it's important to use a password manager. This is a clip from my Ethical Hacking course.

Canary tokens

In this video we talk about using Canary tokens to track a user.

In this video we talk about how to embed a canary token into a email.

Nmap/Zenmap

In this video we learn how to scan a network with Nmap and Zenmap.

Checking usernames

Checking users with knowem.

In this video we give the full version of Pipl a spin.

Search code

In this video we discuss searching for code online.

Github page for searching code: https://help.github.com/en/articles/searching-code

In this video we use snbox to scan potentially malicious files and see what lies within.

VPN

In this video we discuss VPNs and how to test them with DNSleak.

Is that IP a Tor IP? Lets use exhonorator and find out.

Criminal checks

http://www.casaforchildren.org/site/c.mtJSJ7MPIsE/b.5553815/k.2B5D/Statewide_Criminal_Background_Check_Resources.htm


https://ncsc-search.squiz.cloud/s/search.html?clicked_fluster=public+records&cluster0=records&profile=_default&query=%60public+records%60&collection=ncsc-meta


https://pipl.com/


https://www.studordud.com/


https://www.nsopw.gov/

In this video we check various crimes with crime reports.

In this video we learn how to search for inmates.

Is that gun stolen? Let's find out with hotgunz.

Additional Twitter tools

In this video we check if that twitter user is a bot.

Another bot checking program.

Twitter wayback machine: http://staringispolite.github.io/twayback-machine/?ref=producthunt

In this video we use the Twitter scraping tool Twint.

Spoonbill
Additional Facebook tools

In this video we use the facebook "stalking" tool Stalkface for OSINT.

In this video we use the Facebook tool who posted what.

Reddit

In this video we take a look at how to retrieve deleted Reddit comments.

Instagram
Instagram User search
Instaloader

https://igram.io/

Plagiarism check

https://smallseotools.com/plagiarism-checker/

In this video we take a look at leveraging a plagiarism checker for OSINT.

When doing OSINT searches on sites, it is useful to create a new identity.
Sock puppets revisited

Make a fake profile with thispersondoesnotexist.

In this video we take a look at how to create a OSINT profile.

Dating

In this video we use a Ashley Madison leaked database to find users.

Searching for our target through Tinder.

Burner number-fake profile-geolocation switching.

Face searching with Pimeyes.

Finding scams and fake profiles with Scamdigger.

Bonus: Dating OSINT Tips
Other people search

Public database searching with Cubib.

Is a person deceased or using a deceased person's identity? It happens, findagrave.

Ancestery grave search
IntelligenceX

https://github.com/megadose/holehe

FamilyTree Now

https://github.com/sc1341/Venmo-OSINT

State Farm
Politics

Voter records are a matter of public information. In this video we take a look at that.

http://www.politicalmoneyline.com/

Did that company donate to a political party?

https://www.opensecrets.org

Deleted political tweets? Politwoops to the rescue.

Business

Researching companies with the Better Business Bureau.

Tracking scams with the BBB scam tracker.

https://www.dobsearch.com/business-lookup/

Business searches with dobsearch.

Dig deeper into a company with glassdoor.

Additional content: OpenCorporates
Additional content: Security and Exchange Commision
Clustrmaps
Bitcoin

Save this course

Save OSINT: Open-Source Intelligence Level 2 to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in OSINT: Open-Source Intelligence Level 2 with these activities:
Review OSINT Fundamentals
Reviewing OSINT fundamentals will ensure a solid base for understanding the advanced techniques covered in this course.
Browse courses on Information Gathering
Show steps
  • Review the OSINT definition and its applications.
  • Study the OSINT process: planning, collection, processing, analysis, and dissemination.
  • Familiarize yourself with common OSINT tools and techniques.
Review "Social Engineering: The Science of Human Hacking"
Reviewing this book will enhance your understanding of social engineering and its role in OSINT investigations.
View Human Hacking on Amazon
Show steps
  • Read the book and take notes on key social engineering principles.
  • Analyze real-world examples of social engineering attacks.
  • Consider how social engineering techniques can be used in conjunction with OSINT methods.
Create a Burner Account Guide
Creating a guide on setting up burner accounts reinforces the importance of anonymity and operational security in OSINT investigations.
Show steps
  • Research best practices for creating burner email and social media accounts.
  • Document the steps for setting up a secure and anonymous burner account.
  • Share your guide with other students for feedback and improvement.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Practice Domain Reconnaissance
Practicing domain reconnaissance techniques will improve your ability to gather information about target websites and organizations.
Show steps
  • Use tools like Dmitry, Dig, and the Harvester to gather domain information.
  • Analyze the collected data to identify subdomains, email addresses, and other relevant information.
  • Document your findings and identify potential vulnerabilities.
Review "Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information"
Reviewing this book will provide a deeper understanding of OSINT techniques and resources.
Show steps
  • Read the book and take notes on key concepts and techniques.
  • Experiment with the tools and resources mentioned in the book.
  • Compare the book's content with the course materials and identify areas of overlap and divergence.
Build a Custom OSINT Tool List
Creating a custom tool list helps you organize and prioritize the most effective OSINT tools for different types of investigations.
Show steps
  • Categorize OSINT tools based on their function (e.g., social media, domain analysis, people search).
  • Evaluate and rank tools based on their accuracy, speed, and ease of use.
  • Document the purpose and usage of each tool in your list.
OSINT Investigation Project
Undertaking an OSINT investigation project allows you to apply the techniques learned in the course to a real-world scenario.
Show steps
  • Define the scope and objectives of your OSINT investigation.
  • Gather information from various open sources using the tools and techniques learned in the course.
  • Analyze the collected data to identify patterns, connections, and insights.
  • Document your findings in a comprehensive report.

Career center

Learners who complete OSINT: Open-Source Intelligence Level 2 will develop knowledge and skills that may be useful to these careers:
Private Investigator
Private Investigators conduct investigations for individuals, businesses, and legal professionals. This course can prepare you for your work as a Private Investigator, since its modules on OSINT tools and techniques directly enhance your ability to gather information discreetly and effectively. The exploration of public records, social media investigations, and criminal background checks directly supports core investigative tasks. The attention to detail in verifying information and uncovering hidden connections, like dating profiles and relationships, may also be helpful. Private Investigator's greatly benefit from burner accounts.
Intelligence Analyst
An Intelligence Analyst gathers information from various sources and analyzes it to provide insights and actionable intelligence. This course helps build a foundation in OSINT techniques, which are crucial for an Intelligence Analyst to collect data from publicly available sources. The course's focus on tools for website crawling, domain investigation with 'Dig', and email harvesting techniques directly supports an analyst's ability to gather comprehensive datasets. This course also touches on using social engineering in OSINT, which is helpful when an Intelligence Analyst needs to understand deceptive tactics in social media and communication channels.
Fraud Investigator
A Fraud Investigator investigates cases of suspected fraud. In this course, the modules on criminal background checks and vehicle lookups directly aid in uncovering fraudulent activities. The course's exploration of dating app investigations and scam detection using tools like Scamdigger may assist a Fraud Investigator in uncovering romance and financial scams. Skills developed during this training, like analyzing public databases using Cubib and searching for deceased individuals, can provide critical insights. A Fraud Investigator may find the course’s lessons on using burner accounts for investigations especially beneficial.
Background Investigator
Background Investigators conduct thorough checks on individuals for employment, security clearances, or other sensitive positions. This course emphasizes OSINT tools and techniques which significantly enhance a Background Investigator's ability to gather comprehensive information. The exploration of public records, criminal checks, and social media investigations directly supports the core responsibilities of a Background Investigator. The course's attention to detail in verifying information, like using ancestry grave searches, can help uncover discrepancies and potential red flags. This course may also be helpful in showing how to set up OSINT profiles and using tools like Pimeyes for facial recognition.
Cybersecurity Analyst
A Cybersecurity Analyst works to protect computer systems and networks from cyber threats. This course can be particularly beneficial because OSINT techniques help discover vulnerabilities and potential attack vectors. The course teaches how to use tools like Nmap/Zenmap for network scanning, which is crucial for a Cybersecurity Analyst to assess network security. Further, the skills taught in this course, like analyzing potentially malicious files with tools such as Snbox, can help a Cybersecurity Analyst identify and mitigate threats before they cause harm. Additionally, the course covers VPNs and how to test them, which is helpful when evaluating the security posture of a network.
Legal Investigator
A Legal Investigator assists attorneys by gathering facts, conducting interviews, and collecting evidence for legal cases. This course may be useful as the course’s emphasis on OSINT helps build a foundation for uncovering information relevant to legal proceedings. The course's focus on tools for criminal background checks, public records searches, and social media investigations can greatly assist a Legal Investigator in building a case. Skills developed include tracing individuals, verifying identities, and uncovering potential witnesses or evidence, which are invaluable for supporting legal strategies.
Security Consultant
Security Consultants assess security risks and develop strategies to protect assets. This course may be useful as OSINT skills are critical for evaluating vulnerabilities and gathering threat intelligence. The exploration of network scanning with tools like Nmap/Zenmap, analyzing malicious files, and understanding VPN security help a Security Consultant assess the security posture of an organization. The course can also help Security Consultants help businesses detect threats before they occur. Security Consultants may also benefit from learning about canary tokens.
Journalist
Journalists investigate and report on current events. This course may be useful as the skills developed during this training in OSINT help uncover information from various sources, verify facts, and protect sources. The course's exploration of techniques like digging into domains with 'Dig', harvesting emails, and using VPNs to maintain anonymity provide journalists with essential tools. The course also covers using social media analysis to track stories and verify information on platforms like Twitter, Facebook, and Instagram. The skills taught in this course aid in discovering information.
Due Diligence Analyst
A Due Diligence Analyst investigates companies and individuals to assess risks and verify information during mergers, acquisitions, and investments. This course may be useful as its coverage of OSINT techniques provide the tools necessary to conduct in-depth background checks and risk assessments. Skills developed during this training, such as exploring business databases, researching company backgrounds with the Better Business Bureau, and utilizing tools like OpenCorporates, can greatly enhance a Due Diligence Analyst's ability to uncover critical information. Learning how to uncover potential risks and verify the legitimacy of business entities using OSINT techniques is crucial for this job.
Compliance Officer
A Compliance Officer ensures that a company adheres to regulatory requirements and internal policies. This course may be useful as the OSINT skills gained can greatly aid in monitoring adherence to laws and regulations. The course's focus on researching business entities with the Better Business Bureau, tracking scams, and exploring databases like OpenCorporates can provide valuable tools for identifying potential risks. The course touches on researching political donations, which may be useful in assessing compliance with lobbying laws.
Market Researcher
Market Researchers analyze market trends and consumer behavior to advise companies on product development and marketing strategies. This course may be useful as understanding OSINT and social media analysis can provide valuable insights into consumer sentiment and competitive landscapes. Skills developed during this training, such as using tools to scrape Twitter data, can aid in tracking brand mentions and identifying emerging trends. The course's exploration of business databases and company research tools like Glassdoor can help Market Researchers gather intelligence on competitors and market dynamics. This course teaches how to generate identities and sock puppets which may be useful.
Human Resources Specialist
A Human Resources Specialist manages various aspects of employee relations, including recruitment, background checks, and compliance. This course may be useful as the knowledge of OSINT techniques can enhance a Human Resources Specialist's ability to conduct thorough background checks and verify candidate information. The skills taught in this course, such as exploring public records, conducting criminal checks, and utilizing social media investigations, can greatly aid in ensuring a safe and compliant workplace. The course’s exploration of encryption may be useful when HR needs to send files.
Paralegal
Paralegals assist lawyers by conducting legal research, gathering evidence, and preparing legal documents. This course can be helpful for a paralegal since the knowledge of OSINT can aid in gathering information for ongoing cases. Skills related to public records, such as checking voter records or ancestry records, support legal research. The course's exploration of social media investigation and online searches can provide additional sources of information. The skills developed during this training may assist in finding resources otherwise not available.
Data Analyst
Data Analysts examine and interpret data to identify trends and insights for business decision-making. This course may be useful as it emphasizes gathering information from various sources on the internet, which can be analyzed to support decision making. The course's focus on web crawling assists with gathering information from a website. The exploration of social media analysis tools can also provide a Data Analyst with valuable skills in extracting data. Tools and skills acquired here may improve the ability of a data analyst to find insights and patterns.
Librarian
Librarians manage and organize information resources, assisting patrons in finding relevant materials. Many skills developed during this online training may be useful. Learning to discern disinformation from reliable sources will improve information literacy. Librarians also assist patrons in conducting research and evaluating the credibility of online sources, which relates directly to OSINT. The course may be useful as it also covers ethical considerations in accessing and sharing information, such as privacy concerns and intellectual property rights.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in OSINT: Open-Source Intelligence Level 2.
Comprehensive guide to OSINT techniques, covering a wide range of tools and resources. It provides detailed instructions on how to search and analyze online information effectively. This book is commonly used by industry professionals. It adds depth to the course by providing practical examples and case studies.
Explores the psychology and techniques behind social engineering attacks. It provides insights into how attackers manipulate human behavior to gain access to sensitive information. This book is more valuable as additional reading. It adds breadth to the course by covering the human element of OSINT.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser