We may earn an affiliate commission when you visit our partners.
Aleksa Tamburkovski and Konrad Bienias

Master the art of Open Source Intelligence and unlock the secrets hidden across the internet. This course takes you from a beginner to an advanced OSINT practitioner with a straightforward, expert-guided approach.

You’ll learn how to safely and effectively gather intelligence from publicly available sources, utilizing the same techniques used by investigators, cybersecurity professionals, and journalists. This course covers all essential aspects of OSINT, from the ethical considerations of information gathering to advanced search techniques and beyond.

Read more

Master the art of Open Source Intelligence and unlock the secrets hidden across the internet. This course takes you from a beginner to an advanced OSINT practitioner with a straightforward, expert-guided approach.

You’ll learn how to safely and effectively gather intelligence from publicly available sources, utilizing the same techniques used by investigators, cybersecurity professionals, and journalists. This course covers all essential aspects of OSINT, from the ethical considerations of information gathering to advanced search techniques and beyond.

Explore a wide range of tools and techniques for uncovering information about individuals, companies, and even physical locations. You'll master the use of search engines, social media analysis, email tracing, and image verification, all while maintaining your anonymity and protecting your data.

Learn how to set up secure environments using virtual machines, VPNs, and specialized operating systems like CSI Linux. Delve into the world of sock puppets, creating and managing fake identities to gather intelligence undetected. You’ll also explore the dark web, understand the importance of encryption, and discover how to remove your own data from the internet.

By the end of this course, you’ll have a practical, hands-on skill set that will make you proficient in the art of OSINT. Whether you're aiming to enhance your career or satisfy your curiosity, this course is your gateway to mastering the world of online intelligence gathering.

Enroll now

What's inside

Learning objectives

  • Gather publicly available data to perform investigations
  • Analyze, and interpret data in investigations
  • Stay anonymous while browsing the web
  • Create, and use sock puppets to obtain information
  • Enhance and optimize the process of using search engines
  • Search people by their phone numbers, email addresses, names, and usernames
  • Search businesses and related information
  • Analyze and trace images
  • Investigate locations without the need to go there in person
  • Analyze blockchain transactions

Syllabus

Introduction
Introduction To OSINT
Course Breakdown
Osint Methodology
Read more
Safety Measures
Do We Need a VM ?
VM Setup
M1/M2/M3 Macbook Installation
VPNs
Browser Setup
Handling Data In Investigation
Section 2 Notes
Documenting
Advices & Tips On Documenting & Taking Notes
Sock Puppets
What Are They ?
The Approach
Setting Up Sock Puppets
Advanced Techniques & Psyops
Section 4 Notes
Search Engines
Google Search Operators
Bing & DuckDuckGo Search Operators
Yandex & Baidu Search Operators
Section 5 Notes
Searching People
OSINT Tools List
Searching Accounts
Searching People Part 1
Searching People Part 2
Voter Records
Searching Phone Numbers Part 1
Searching Phone Numbers Part 2
Performing Background Checks
Section 6 Notes
Searching Businesses
Searching Companies Part 1
Searching Company Part 2
Section 7 Notes
Resume Hunting
Searching Resumes
Email Search
Enumerating and Verifying Email Addresses
Email Associated Accounts
Leads and Verifying
Password Hunting
Section 9 Notes
Images
Retrieving, Viewing & Handling EXIF Data
Reverse Image Lookup
Facial Recognition
Section 10 Notes
Social Media
Twitter (X)
Discord
Instagram
Facebook
TikTok
Others
Legacy
Legacy Lookup
Section 12 Notes
Physical OSINT
Google Maps
Bing
Section 13 Notes
Extras
Requesting Data Removals
Google Alerts
Deep/Dark Web
Accessing Dark Web With Tor
Crypto OSINT
Section 14 Notes

Save this course

Save Learn OSINT: Open-Source Intelligence to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Learn OSINT: Open-Source Intelligence with these activities:
Review Networking Fundamentals
Reviewing networking fundamentals will provide a solid foundation for understanding how data travels across the internet, which is crucial for OSINT investigations.
Browse courses on Network Fundamentals
Show steps
  • Review the OSI model and TCP/IP suite.
  • Study common network protocols like HTTP, DNS, and SMTP.
  • Practice identifying network traffic patterns using Wireshark.
Review 'The Web as a Forensic Resource' by Richard Vest
Reading this book will provide a deeper understanding of how the internet can be used as a resource for forensic investigations, complementing the course material with real-world examples.
Show steps
  • Read the chapters on web scraping and data mining.
  • Practice the techniques described in the book using online resources.
  • Compare the book's methodologies with those taught in the course.
Review 'Open Source Intelligence Techniques' by Michael Bazzell
Reading this book will provide a deeper understanding of OSINT methodologies and techniques, complementing the course material with real-world examples.
View OSINT Techniques on Amazon
Show steps
  • Read the chapters on advanced search techniques and social media investigations.
  • Practice the techniques described in the book using online resources.
  • Compare the book's methodologies with those taught in the course.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Practice Google Dorking
Practicing Google Dorking will enhance your ability to find specific information using search engines, a core skill for OSINT investigations.
Show steps
  • Review the Google Search Operators section of the course.
  • Create a list of common OSINT targets (e.g., email addresses, usernames, file types).
  • Craft Google Dorks to find information related to those targets.
  • Document your findings and refine your search queries.
Create a Sock Puppet Persona
Creating a sock puppet persona will provide hands-on experience in creating and managing fake online identities, a crucial skill for gathering intelligence undetected.
Show steps
  • Define the purpose and goals of your sock puppet persona.
  • Create a believable backstory and online presence for the persona.
  • Set up social media accounts and engage with relevant communities.
  • Document your activities and track the effectiveness of your persona.
OSINT Investigation Project
Undertaking an OSINT investigation project will allow you to apply the skills and techniques learned in the course to a real-world scenario, solidifying your understanding and enhancing your practical abilities.
Show steps
  • Choose a topic for your OSINT investigation (e.g., a company, an individual, or an event).
  • Gather information from publicly available sources using various OSINT techniques.
  • Analyze and interpret the data to draw conclusions.
  • Document your findings in a comprehensive report.
Create an OSINT Tool Comparison Chart
Creating a comparison chart of OSINT tools will help you understand the strengths and weaknesses of different tools and choose the right tool for a specific task.
Show steps
  • Research and identify a variety of OSINT tools.
  • Categorize the tools based on their functionality (e.g., search engines, social media analysis, image analysis).
  • Compare the tools based on features, pricing, and ease of use.
  • Create a chart summarizing your findings.

Career center

Learners who complete Learn OSINT: Open-Source Intelligence will develop knowledge and skills that may be useful to these careers:
Private Investigator
Private Investigators gather information and evidence for clients, often in sensitive or confidential matters. This course is great for those beginning their journey to becoming a Private Investigator. The course emphasizes the techniques used by investigators, cybersecurity professionals, and journalists. The course covers all essential aspects of OSINT, from ethical considerations to advanced search techniques. You'll learn how to safely and effectively gather intelligence, analyze images, and investigate locations remotely.
Background Investigator
Background Investigators are hired to conduct thorough checks on individuals for employment, security clearances, or other purposes. This course can be a key stepping stone to becoming a Background Investigator. The course's modules on searching people, analyzing social media, and tracing email addresses provide a comprehensive toolkit for gathering information and verifying the accuracy of provided data. The ability to search phone numbers, perform background checks, and remain anonymous while browsing the web would be a valuable asset for a Background Investigator.
Competitive Intelligence Analyst
A Competitive Intelligence Analyst gathers and analyzes information about competitors to help companies make strategic decisions. This role aligns very well with the skills taught in this course. The course gives the ability to gather intelligence from publicly available sources, perform advanced search techniques, and analyze company data. The course provides hands-on skills that make you proficient in online intelligence gathering, a core competency for a Competitive Intelligence Analyst.
Intelligence Analyst
The role of an Intelligence Analyst requires a keen ability to gather, analyze, and interpret information from various sources to identify potential threats or opportunities. This course that dives deep into Open Source Intelligence (OSINT) helps build a strong foundation for a career as an Intelligence Analyst. It covers essential aspects such as ethical considerations, advanced search techniques, and the use of tools for uncovering information about individuals, companies, and physical locations. With the skills acquired, you'll be well-equipped to extract, analyze, and synthesize data from publicly available sources.
Due Diligence Analyst
The primary responsibility of a Due Diligence Analyst is to assess risks and verify information before a business transaction or partnership. A Due Diligence Analyst greatly benefits from OSINT skills. The course's coverage of advanced search techniques, searching businesses, and analyzing social media provides a framework for verifying information and detecting potential red flags. The course's focus on OSINT practices that uncover information about companies helps enhance a Due Diligence Analyst's ability to conduct comprehensive risk assessments.
Cybersecurity Analyst
A Cybersecurity Analyst protects computer systems and networks from threats, which requires staying ahead of potential vulnerabilities. This course provides valuable skills in OSINT that bolster the abilities of a Cybersecurity Analyst. The course covers setting up secure environments using virtual machines, VPNs, and specialized operating systems, which are essential to understanding an attacker's mindset and methods. Moreover, the ability to gather intelligence safely and effectively from publicly available sources, as emphasized in the course, is vital for proactive threat hunting and incident response.
Security Consultant
A Security Consultant assesses security risks and develops strategies to protect organizations from threats. This course aids security consultants by demonstrating advanced techniques. The course's emphasis on setting up secure environments and understanding the importance of encryption aligns specifically with the responsibilities of a Security Consultant. You'll learn to maintain anonymity and protect data, which are critical aspects of securing an organization's information assets.
Fraud Investigator
A Fraud Investigator examines financial records and other data to detect and prevent fraudulent activities. This course could be highly beneficial, as it equips you with the tools and techniques to gather intelligence from publicly available sources. The course covers advanced search techniques, social media analysis, and email tracing, which are critical for uncovering fraudulent schemes and identifying perpetrators. By mastering the art of OSINT, a Fraud Investigator can enhance their ability to conduct thorough and effective investigations.
Paralegal
Paralegals assist lawyers by conducting legal research, preparing documents, and gathering evidence for cases. Skills taught in this course help a Paralegal. The course's coverage of advanced search techniques, social media analysis, and email tracing allows you to uncover critical information efficiently. The skills to search people by their phone numbers, email addresses, and names, will be a tremendous asset in supporting legal investigations and building a stronger case.
E-Discovery Specialist
E-Discovery Specialists manage the process of identifying, collecting, and producing electronically stored information (ESI) for legal cases. An E-Discovery Specialist will find this course helpful. The course teaches you how to safely and effectively gather intelligence from publicly available sources, which is essential in the context of e-discovery. By mastering advanced search techniques, email tracing, and social media analysis, you can enhance your ability to locate and preserve relevant digital evidence.
Journalist
Journalists investigate and report on current events. OSINT skills are useful in this kind of work. This course may be useful, as it covers the essential aspects of OSINT, from ethical considerations to advanced search techniques. You'll explore various tools and techniques for uncovering information about individuals, companies, and locations, which will substantially aid in journalistic investigations. Mastering search engines, social media analysis, and image verification, all while maintaining anonymity, will enhance the depth and accuracy of reporting.
Research Analyst
Research Analysts collect, analyze, and interpret data to provide insights and recommendations to organizations. This course may be useful for a Research Analyst. The course teaches gathering publicly available data, analyzing social media, and investigating locations remotely. The course will give hands-on skills that make you proficient in online intelligence gathering, a core competency for a Research Analyst.
Data Broker
Data Brokers collect and sell information about individuals and companies to various clients. This course can be a first step to becoming a Data Broker. The course teaches how to safely and effectively gather intelligence from publicly available sources, which is a key competency for a Data Broker. The course covers advanced search techniques, social media analysis, and email tracing, which will enhance the ability to collect and manage data ethically and effectively.
Market Researcher
Market Researchers analyze market trends and consumer behavior to advise companies on product development and marketing strategies. A Market Researcher could gain new skills from this course. The course will teach skills that are helpful in gathering intelligence from publicly available data, which is valuable for understanding market dynamics and competitive landscapes. Skills in advanced search techniques, social media analysis, and identifying emerging trends help you excel as a Market Researcher.
Compliance Officer
Compliance Officers ensure that a company follows all regulatory and ethical guidelines. This course helps in the work of Compliance Officers. The course teaches you to gather intelligence from publicly available sources, which enhances ability to conduct thorough investigations and verify compliance. The course also provides coverage of advanced search techniques, social media analysis, and email tracing, which makes you well-equipped to detect and address potential compliance issues.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Learn OSINT: Open-Source Intelligence.
Comprehensive guide to OSINT techniques, covering a wide range of tools and methodologies. It provides practical examples and real-world case studies, making it an invaluable resource for both beginners and experienced practitioners. The book delves into advanced search strategies, social media investigations, and data analysis techniques, adding significant depth to the course material. It is commonly used by professionals in the field.
Provides a detailed overview of how the internet can be used as a resource for forensic investigations. It covers topics such as web scraping, data mining, and social media analysis. It is particularly useful for understanding how to collect and analyze digital evidence from online sources, adding breadth to the course material. This book valuable reference for professionals in law enforcement and cybersecurity.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser