We may earn an affiliate commission when you visit our partners.
Jeff Minakata

In this course we will be continuing our learning and understanding of OSINT. If you took my previous course ( OSINT: Open-Source Intelligence For hackers, investigators, and everyone else) then this will be a continuation from that. In this course we continue learning about additional tools along with the how and why. We create burner accounts for OSINT, criminal background checks, vehicle lookups, using Linux for OSINT, and much more. There is a growing need for OSINT skills as there is a increase in cyber crime, fraud, misinformation, disinformation campaigns, etc.

Read more

In this course we will be continuing our learning and understanding of OSINT. If you took my previous course ( OSINT: Open-Source Intelligence For hackers, investigators, and everyone else) then this will be a continuation from that. In this course we continue learning about additional tools along with the how and why. We create burner accounts for OSINT, criminal background checks, vehicle lookups, using Linux for OSINT, and much more. There is a growing need for OSINT skills as there is a increase in cyber crime, fraud, misinformation, disinformation campaigns, etc.

This course is ideal for hackers, pentesters, investigators, HR, and everyone else. I appreciate that you are taking a look and hopefully joining this course. I work hard to provide great content and support. Feel free to check out my original OSINT course if you haven't already and preview the videos and read the reviews. This course is built and expands your knowledge from the previous

before, during and even after you take the course I will do my best to help you out with any questions that you have.

Happy hunting.

FYI, a reminder: I not anyone that is a part of DGS has any affiliation with any of the vendors, software manufactures, or programmers in this course.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Learning objectives

  • Open source intelligence (osint)
  • Using various tools to conduct investigations
  • Further learning of osint methodologies
  • New ways to tackle an investigation

Syllabus

Introduction
Disclaimer
What will you need
Paid tools?
Read more
paid tools?
Brave Browser
Code Searching
Checklist
Fast Checklist
OSINT Cycle
Other OSINT Subsets
Android Emulation
Bluestacks
Website crawling
DNSlytics
Data Miner
Search
OSIRS
Overload Search
Yandex and Baidu
Subdomainfinder
Other
Eyes on Ruissia
On Chain Industry
Social Engineering
About Social Engineering and OSINT
Getting to know your target
Grabify
Tracking using a Visa Gift Card
Email spoofing
Deeper searches
Funnel Search
Sherlockeye
Translate foreign language in images with Google Translate
Darkweb Threat intelligence
Telegram
Home Ownership
Finding Who Owns a Home
Redfin and Zillow
Nmap and Zenmap
Installing and using
Manalyzer
Criminal Checks
Criminal Background Check
Sex offender check
Crime reports
Inmate Locator
Hotgunz
Twitter/X
Mindmap
Reddit
Undelete Reddit
Plagerism
Plagiarism check
AI Plagiarism
Dating
Ashley
Tinder
Pimeyes
Scam digger
Dating tips
More people searches
Xelek
Find a grave
Ancestry grave
IntellegenceX
Family Tree Now
Who am I?
Data Breach
Proxy Nova
Politics
Voter records
Political Donations
Open Secrets
Business
Better Business Bureau
BBB Scam Tracker
Glassdoor
Pissed Consumer
Bitcoin
Bitcoin whos who
Bitref
Blockchain explorer
Photos
Social Catifsh
Remove Background
Image Enhancement
Same person?
AI shopped?
Investigation
Email OSINT
Name OSINT
OSINT Rocks
OSINT Quest
Finding logos
Hardware security

Save this course

Save Level 2 OSINT: Open-Source Intelligence Windows edition to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Level 2 OSINT: Open-Source Intelligence Windows edition with these activities:
Review OSINT Fundamentals
Reinforce your understanding of core OSINT principles and techniques to provide a solid foundation for the advanced topics covered in this course.
Show steps
  • Review notes from introductory OSINT courses or materials.
  • Practice basic search techniques using search engines and social media platforms.
  • Familiarize yourself with common OSINT tools and resources.
Create a Mind Map of OSINT Techniques
Organize and visualize the various OSINT techniques covered in the course by creating a mind map, which will help you better understand their relationships and applications.
Show steps
  • Review the OSINT techniques covered in the course.
  • Use mind mapping software to create a visual representation of the techniques.
  • Organize the techniques into categories and subcategories.
  • Add notes and examples to each technique.
Review 'Open Source Intelligence Techniques' by Michael Bazzell
Deepen your understanding of OSINT methodologies and tools by studying a comprehensive guide written by a leading expert in the field.
View OSINT Techniques on Amazon
Show steps
  • Read selected chapters focusing on techniques relevant to the course syllabus.
  • Experiment with the tools and techniques described in the book.
  • Take notes on key concepts and methodologies.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Practice Reverse Image Searches
Improve your skills in identifying and verifying images by practicing reverse image search techniques using various search engines and tools.
Show steps
  • Find a set of images online.
  • Use Google Images, TinEye, and Yandex to perform reverse image searches.
  • Analyze the results to identify the source and context of the images.
Create an OSINT Tool Review
Solidify your understanding of specific OSINT tools by creating a detailed review, including their features, capabilities, and limitations.
Show steps
  • Select an OSINT tool covered in the course.
  • Thoroughly test the tool and explore its features.
  • Write a comprehensive review, including screenshots and examples.
  • Share your review on a relevant online forum or blog.
OSINT Investigation Project
Apply the OSINT techniques learned in the course to a real-world investigation scenario to solidify your skills and gain practical experience.
Show steps
  • Define a clear objective for your OSINT investigation.
  • Gather information from various open sources using the techniques learned in the course.
  • Analyze the collected data and draw conclusions.
  • Document your findings in a comprehensive report.
Review 'The Web as a Forensic Resource' by Richard Vest
Learn how to leverage the web as a forensic resource by studying a book that covers web scraping, social media analysis, and online data collection.
Show steps
  • Read selected chapters focusing on techniques relevant to the course syllabus.
  • Experiment with the tools and techniques described in the book.
  • Take notes on key concepts and methodologies.

Career center

Learners who complete Level 2 OSINT: Open-Source Intelligence Windows edition will develop knowledge and skills that may be useful to these careers:
OSINT Analyst
As an OSINT Analyst, you are responsible for gathering and analyzing publicly available information to produce actionable intelligence for decision-makers. This course is highly relevant for anyone looking to become an OSINT Analyst. The OSINT Analyst will make use of the course's comprehensive curriculum, covering various tools, methodologies, and techniques for conducting effective OSINT investigations. The course's emphasis on open source tool usage can help build a strong OSINT Analyst.
Background Investigator
A Background Investigator conducts comprehensive background checks on individuals for employment, security clearance, or other purposes. The comprehensive toolset and knowledge of OSINT techniques provided in this course are highly relevant to the responsibilities of a Background Investigator. A Background Investigator can use the course's sections on criminal checks, data breaches, and social media investigations to enhance their investigative capabilities. Anyone looking to start their career as a Background Investigator can learn about tools central to this role.
Private Investigator
A Private Investigator conducts investigations for individuals or organizations, gathering information through surveillance, research, and interviews. This course can be valuable to someone looking to begin a career as a Private Investigator. This course's emphasis on open source intelligence, tools, and methodologies can help one become more capable as a Private Investigator. The sections on social engineering, finding who owns a home, and dating tips may be particularly useful to a Private Investigator.
Intelligence Analyst
The role of an Intelligence Analyst involves gathering and analyzing information to identify threats and provide actionable insights. This course directly applies to the work of an Intelligence Analyst. It provides training on using various tools and methodologies for OSINT as well as how to conduct in depth investigations. An aspiring Intelligence Analyst would benefit from the course's sections on criminal background checks, open source tools, and methods for conducting investigations. The course provides skills that help build a foundation for becoming an effective Intelligence Analyst, especially in the realm of cyber crime.
Fraud Investigator
As a Fraud Investigator, you would be responsible for examining financial records and other data to detect and prevent fraudulent activities. The skills learned in this course directly support the investigative work that a Fraud Investigator does. A Fraud Investigator would find particular value in the sections on criminal background checks, email spoofing, and tracking using a Visa Gift Card. The course will help someone become a more competent Fraud Investigator, especially when using open source information to resolve cases.
Cybersecurity Analyst
A Cybersecurity Analyst protects computer systems and networks from cyber threats by monitoring for security breaches, conducting vulnerability assessments, and responding to incidents. This course helps with the skills necessary to become a Cybersecurity Analyst by introducing tools to conduct OSINT. The course's comprehensive syllabus, including sections on darkweb threat intelligence, data breaches, and hardware security, directly addresses the tasks performed by a Cybersecurity Analyst. The course equips individuals to proactively identify and mitigate potential cyber threats, making them more effective in their role as a Cybersecurity Analyst.
Due Diligence Analyst
As a Due Diligence Analyst, one conducts thorough investigations and analysis to assess risks and verify information for financial transactions, mergers, and acquisitions. The open source intelligence techniques taught in this course directly contribute to the effectiveness of a Due Diligence Analyst. The course's coverage of business intelligence, criminal background checks, and financial OSINT can help a Due Diligence Analyst uncover critical information and mitigate risk. Due diligence demands a systematic approach to information gathering, something this course emphasizes.
Journalist
Journalists research and report on current events, often requiring them to gather information from various sources, verify facts, and uncover hidden stories. The techniques taught in this course directly support the investigative work of a Journalist. Sections on website crawling, social media analysis, and finding people can help one become a better Journalist. The course's content can help Journalists become more adept at online research and verification, which is essential when it comes to this career.
Financial Crime Investigator
The job of a Financial Crime Investigator is to investigate financial crimes such as money laundering, fraud, and embezzlement. The OSINT skills taught in this course may be valuable for a Financial Crime Investigator for tracing illicit funds and gathering evidence. The course modules on Bitcoin tracing, business intelligence, and criminal checks provide Financial Crime Investigators with tools and techniques to enhance their investigations. A Financial Crime Investigator may also want to consider looking into these tools.
Legal Investigator
The job of a Legal Investigator is to gather factual information for attorneys in preparation for legal proceedings. This course may prove useful for a Legal Investigator who wants to use open source techniques to enhance their investigations. A Legal Investigator can use the course's coverage of criminal checks, property records, and social media analysis to gather evidence and build cases. The course can also serve as a supplemental tool in helping a Legal Investigator be more effective.
Human Resources Specialist
A Human Resources Specialist manages employee relations, recruitment, and compliance within an organization. This course may be useful for Human Resources Specialists who need to conduct background checks or investigate potential workplace issues. The modules on criminal checks, social media OSINT, and business intelligence provide Human Resources Specialists with tools to vet candidates and ensure a safe work environment. A Human Resources Specialist can use this course to gain techniques for open source intelligence and investigation, and also broaden their knowledge of employee screening.
Market Research Analyst
A Market Research Analyst studies market conditions to examine potential sales of a product or service. The OSINT tools and techniques covered in this course may be resourceful to Market Research Analysts looking to gather competitor intelligence or consumer insights from publicly available sources. The course's sections on business OSINT, social media analysis, and website crawling can provide Market Research Analysts with methods to gather and analyze marketing data. The course may serve as a tool in a Market Research Analyst's daily workflow.
Data Miner
Data Miners analyze large datasets to extract meaningful patterns and insights that can be used to improve business decisions. This course may be helpful as it can help a Data Miner understand how open source intelligence techniques can enhance their ability to find relevant data. The course's sections on website crawling, data miner tools, and search methodologies provide Data Miners with additional strategies for finding information. The course may serve as a supplementary tool in a Data Miner's arsenal.
Political Campaign Manager
A Political Campaign Manager coordinates and oversees political campaigns, including fundraising, advertising, and voter outreach. Open source intelligence techniques can be useful for Political Campaign Managers seeking to gather information on opponents or understand voter sentiment. This course's tools such as voter records, political donations, and social media OSINT can help Political Campaign Managers refine their campaign strategies. This course may prove useful for understanding the impact and perception of a campaign.
Research Scientist
A Research Scientist designs and conducts experiments to investigate scientific phenomena, analyze data, and publish findings. While this course may not be directly related to traditional scientific research, Research Scientists can use OSINT techniques to gather information on emerging trends, competitors, or potential collaborators. The course's modules might be useful for a Research Scientist to use open source information to discover related findings. A Research Scientist may also consider taking some time to learn about this course.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Level 2 OSINT: Open-Source Intelligence Windows edition.
Comprehensive guide to OSINT techniques, covering a wide range of tools and methodologies. It provides practical examples and real-world case studies. It valuable resource for both beginners and experienced OSINT practitioners. This book adds breadth to the existing course.
Explores how the internet can be used as a resource for forensic investigations. It covers topics such as web scraping, social media analysis, and online data collection. It useful reference for investigators and security professionals. This book adds breadth to the existing course.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser