We may earn an affiliate commission when you visit our partners.
Jeff Minakata

In this course you will be learning about OSINT (Open-source intelligence) from a hacker's point of view. Tools, techniques, setting up a virtual lab, and how to protect yourself. This is a comprehensive course that will be using free open source tools to investigate people and companies. No matter if you are totally new to the fascinating world of OSINT and hacking or have some experience, this course will walk you through how both hackers and investigators use these tools and why.

Read more

In this course you will be learning about OSINT (Open-source intelligence) from a hacker's point of view. Tools, techniques, setting up a virtual lab, and how to protect yourself. This is a comprehensive course that will be using free open source tools to investigate people and companies. No matter if you are totally new to the fascinating world of OSINT and hacking or have some experience, this course will walk you through how both hackers and investigators use these tools and why.

Now I have been very fortunate in being able to teach OSINT over the years here and on other platforms teaching people from all over the world and in various jobs. You will generally see my OSINT courses as the best seller and sometimes highest rated (It's really competitive out there.  And that's a good thing for everyone. ) so I think that goes to show that I do work hard on these courses and that people are both learning and enjoying them. In this course I wanted it make it even more accessible my removing the VM requirement as I know that some people either don't have that ability or desire to run a VM (Virtual Machine). I still highly recommend running a VM, however we will be taking a look at performing OSINT without one while still keeping as safe as we can.

Get stuck or have a question? Always feel free to send me a message and I will do my best to help you out.

FYI, a reminder: I not anyone that is a part of DGS has any affiliation with any of the vendors, software manufactures, or programmers in this course.

I do not recommend taking this course if you have taken the

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Learning objectives

  • Osint
  • Open source intelligence
  • Investigations
  • Network security

Syllabus

BIAS
OSINT reporting
OSINT Report templates
Introduction
Read more

Traffic lights

Read about what's good
what should give you pause
and possible dealbreakers
Covers tools and techniques used by both hackers and investigators, providing a dual perspective that enhances understanding of OSINT practices
Teaches how to set up a virtual lab, which is a safe environment to practice OSINT techniques without risking your personal data or system
Explores methods to protect yourself while conducting OSINT, such as using VPNs, secure email, and sock puppets, which are crucial for maintaining anonymity
Presents methods for performing OSINT without a virtual machine, making the course more accessible to those with limited resources or technical expertise
Includes a section on the dark web, covering topics like Tor, hidden wikis, and dark web search engines, which are relevant for advanced OSINT investigations
Devotes a section to social media OSINT, including building Facebook sock puppets, analyzing Twitter data, and using tools like Botometer, which are essential for social media investigations

Save this course

Create your own learning path. Save this course to your list so you can find it easily later.
Save

Reviews summary

Comprehensive osint tools and techniques overview

According to students, this course provides a broad and comprehensive overview of Open Source Intelligence (OSINT), covering a wide array of tools and techniques. Learners appreciate the instructor's clear explanations and the focus on practical demonstrations, making it a solid starting point for those new to the field. Many find the inclusion of safety tips and the use of free, open-source tools particularly valuable. However, some students note that the fast-paced nature may require prior technical familiarity, and a common point mentioned is that some tools or links demonstrated may become outdated quickly due to the dynamic nature of OSINT.
Beneficial with some prior tech knowledge.
"While beginner-friendly in approach, having some basic understanding of operating systems or VMs helps."
"Some parts moved quickly, and I feel a bit of technical background would have made it easier."
"Familiarity with concepts like virtual machines or Linux commands is beneficial for this course."
"It helps if you're comfortable setting up software and navigating different operating environments."
Focuses on staying safe and anonymous during OSINT.
"The sections on protecting your identity and using tools like VMs and VPNs were crucial and very well explained."
"I particularly valued the emphasis on setting up a safe environment before starting any OSINT work."
"Learned important tips on how to stay anonymous and protect myself while doing online investigations."
"The instructor did a great job stressing the importance of operational security (OPSEC) for OSINT."
Provides a good foundation for newcomers to OSINT.
"As someone new to OSINT, this course was an excellent introduction and gave me a clear path to learn more."
"It breaks down complex topics into understandable segments, suitable for beginners."
"This course gave me the foundational knowledge I needed to start exploring OSINT on my own."
"I had zero background in OSINT and found this course accessible enough to get started."
Hands-on demonstrations make concepts easy to grasp.
"The hands-on demonstrations of the tools were incredibly helpful; I could follow along and see exactly how they work."
"I really appreciated the practical examples used throughout the course."
"Seeing the tools in action through the instructor's demos solidified my understanding much better than just theory."
"The way the instructor walked through using each tool step-by-step was very effective."
Explores a wide range of OSINT tools and techniques.
"This course covers a vast amount of ground, introducing tons of different tools and methods for OSINT."
"I was impressed by the sheer number of tools and resources the instructor showed us; it felt very comprehensive."
"I got a great overview of various OSINT techniques and which tools to use for different types of investigations."
"Learned about many new tools that I didn't even know existed for gathering open source intelligence."
Dynamic field means some tools/links may not work.
"Some of the tools and websites demonstrated in the lectures are no longer active or have changed significantly."
"It's a bit frustrating when you try to follow along with a demo, but the link or tool doesn't work anymore."
"Due to the nature of OSINT, some course materials related to specific websites needed updating."
"I encountered several instances where the tools shown in the videos were either discontinued or had major updates."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in OSINT: Open Source Intelligence with these activities:
Review Networking Fundamentals
Reviewing networking fundamentals will provide a solid base for understanding how OSINT tools interact with networks and gather information.
Browse courses on network security
Show steps
  • Review the OSI model layers.
  • Study common network protocols.
  • Practice identifying network vulnerabilities.
Review "The Web Application Hacker's Handbook"
Understanding web application vulnerabilities can aid in identifying potential OSINT targets.
Show steps
  • Read the book chapter by chapter.
  • Take notes on key vulnerabilities.
  • Relate vulnerabilities to OSINT techniques.
Review "Open Source Intelligence Techniques"
Reading this book will provide a deeper understanding of OSINT methodologies and tools.
Show steps
  • Read the book chapter by chapter.
  • Take notes on key concepts.
  • Try out the techniques described.
Four other activities
Expand to see all activities and additional details
Show all seven activities
Practice Google Dorking
Practicing Google Dorking will improve your ability to find specific information using advanced search operators.
Show steps
  • Review Google Dorking operators.
  • Create a list of target keywords.
  • Craft Google Dorking queries.
  • Analyze the search results.
Create a Sock Puppet Account
Creating a sock puppet account will allow you to practice OSINT techniques in a safe and controlled environment.
Show steps
  • Use the account to gather information.
  • Choose a platform for the account.
  • Create a fake persona.
  • Set up the account with privacy in mind.
OSINT Investigation Project
Starting an OSINT investigation project will allow you to apply the skills and knowledge learned in the course to a real-world scenario.
Show steps
  • Choose a target for investigation.
  • Gather information using OSINT techniques.
  • Analyze the collected data.
  • Write a report summarizing your findings.
Compile a List of OSINT Resources
Compiling a list of OSINT resources will help you organize and access valuable tools and information for future investigations.
Show steps
  • Identify relevant OSINT tools and websites.
  • Categorize the resources by function.
  • Add descriptions and links to each resource.
  • Share the list with other students.

Career center

Learners who complete OSINT: Open Source Intelligence will develop knowledge and skills that may be useful to these careers:
Intelligence Analyst
An Intelligence Analyst gathers and analyzes information from various sources to identify trends and potential threats. This OSINT course emphasizes open source tools and techniques for investigation, directly applicable to an Intelligence Analyst's work in collecting and interpreting publicly available data. You will learn how hackers and investigators use these tools, gaining a comprehensive understanding of OSINT methodologies. The material on data collection, investigation cycles, and specific search techniques such as Google Dorks and reverse searches, helps build a foundation for effective intelligence gathering. The course's discussion of sock puppets and secure email practices provides insights into maintaining anonymity and handling sensitive data, vital skills for an Intelligence Analyst.
Cybersecurity Analyst
A Cybersecurity Analyst protects computer systems and networks from cyber threats. This role requires a strong understanding of open source intelligence, as taught in this OSINT course, to identify vulnerabilities and potential attacks. The course's coverage of tools, techniques, and setting up a virtual lab helps a Cybersecurity Analyst simulate and analyze threats in a controlled environment. You will learn about network security, VPNs, and the Darkweb, which are essential for understanding the threat landscape. The course's emphasis on protecting yourself and maintaining security aligns with the Cybersecurity Analyst's responsibility to safeguard digital assets. The course may be useful due to its focus on practical OSINT skills.
Fraud Investigator
A Fraud Investigator examines suspicious financial activity to detect and prevent fraud. This OSINT course helps train individuals in open source intelligence, which is valuable for finding information on individuals and businesses involved in fraudulent schemes. The course covers techniques such as Google Dorks, reverse searches, and business searches, enabling a Fraud Investigator to uncover hidden connections and assets. You will discover methods for gathering and handling data, along with the investigation cycle, which helps in structuring fraud investigations. The sections on people searches, resume finders, and property records provide additional resources for tracking down individuals and their assets. The course may be useful if you are seeking to build your knowledge of fraud investigation.
Background Investigator
A Background Investigator conducts thorough background checks on individuals for employment, security clearances, or other purposes. This OSINT course gives a solid foundation in open source intelligence, enabling investigators to gather comprehensive information from publicly available sources. The course teaches various search techniques, including people searches, reverse searches, and social media investigations, which are essential for uncovering relevant information. You will also learn about data collection, handling sensitive information, and maintaining anonymity through sock puppets and secure communication methods. The course’s discussion of family trees, property records, and business searches further enhances the investigator's ability to create detailed background reports. If you want to become a background investigator, this course may be valuable.
Due Diligence Analyst
A Due Diligence Analyst assesses the risks and opportunities associated with potential business transactions. This course helps build skills in open source intelligence which is directly applicable to researching companies and individuals involved in these transactions. The course covers business searches, open corporate databases, and website OSINT, enabling a Due Diligence Analyst to conduct thorough assessments. You will also learn about data collection, investigation cycles, and report writing, all crucial for presenting findings in a clear and concise manner. The material on dark web searches and potential risks provides additional insight into uncovering hidden liabilities. The course may be useful as you develop your abilities as a Due Diligence Analyst.
Security Consultant
A Security Consultant advises organizations on how to protect their assets and information from threats. This OSINT course helps build a foundation in open source intelligence, which enables consultants to assess vulnerabilities and gather threat intelligence. The course covers a wide range of topics, including network security, social media investigations, and dark web analysis, providing a comprehensive understanding of the threat landscape. You will learn how to use various tools and techniques to identify potential risks and recommend appropriate security measures. The material on VPNs, secure email, and protecting personal information is particularly relevant for consultants advising on data protection strategies. Since this course offers breadth, it may be helpful.
Risk Analyst
A Risk Analyst identifies and assesses potential risks to an organization. This OSINT course helps build a foundation in open source intelligence, enabling analysts to gather information on potential threats and vulnerabilities. The course covers techniques such as open source searching, social media analysis, and dark web monitoring, providing a broad understanding of the risk landscape. You will learn how to use tools and techniques to identify potential risks and develop mitigation strategies. The course material on data handling, investigation cycles, and report writing helps in structuring risk assessments and communicating findings effectively. Since this course is an introduction, it may be helpful.
Market Research Analyst
A Market Research Analyst studies market conditions to examine potential sales of a product or service. This OSINT course may be helpful in open source intelligence, which enables analysts to gather information on competitors, market trends, and customer behavior. The course covers techniques such as Google Dorks, social media analysis, and website OSINT, which can be used to extract valuable market insights. You will learn how to collect and analyze data from various sources, identify patterns, and make informed recommendations. The material on business searches, open corporate databases, and competitive intelligence provides additional resources for market research. The course may be useful to you because it explores open source intelligence in a hacking context.
Competitive Intelligence Analyst
A Competitive Intelligence Analyst gathers and analyzes information about competitors to help an organization gain a strategic advantage. This OSINT course may be useful in open source intelligence, which enables analysts to collect and analyze publicly available data on competitors. The course covers techniques such as website OSINT, social media analysis, and business searches, which are valuable for gathering competitive intelligence. You will learn how to identify key competitors, track their activities, and assess their strengths and weaknesses. The material on data collection, investigation cycles, and report writing helps in structuring competitive intelligence projects and communicating findings effectively. The course's hacking context may be useful to you.
Journalist
A journalist investigates and reports on current events. This OSINT course may be helpful in open source intelligence, which is valuable for gathering information from publicly available sources and verifying facts. The course covers techniques such as social media investigations, reverse searches, and website OSINT, enabling a journalist to uncover leads and verify information. You will learn how to use various tools and techniques to collect and analyze data, identify patterns, and develop compelling stories. The material on data handling, secure communication, and ethical considerations is particularly relevant for journalists. This course's hacking context may be beneficial.
Researcher
A researcher conducts investigations, gathering and analyzing data to expand knowledge in a particular field. While primarily focused on open source intelligence, this OSINT course may be helpful for researchers who need to gather information from publicly available sources, particularly online. The course covers a range of tools and techniques for data collection, including Google Dorks, reverse searches, and social media analysis. You will learn how to use these tools effectively to find relevant information for your research projects. The course's emphasis on data handling and investigation cycles may improve your research process, and the material on secure communication may be relevant for protecting sensitive data. The course's hacking context may be helpful in threat assessments.
Librarian
A librarian assists people in locating books and other materials. While focused on open source intelligence, this OSINT course may be helpful in improving information retrieval skills and understanding advanced search techniques. The course covers a variety of search tools and methods, including Google Dorks, reverse searches, and specialized databases. You will learn how to refine search queries, evaluate the credibility of sources, and organize information effectively. This course's instruction in data collection and investigation cycles may be beneficial for librarians who assist patrons with complex research projects. The course's hacking context may be useful in identifying misinformation.
Archivist
An archivist assesses, collects, organizes, preserves, and controls records and archives. Although centered on open source intellgience, this OSINT course may be helpful in understanding data collection and preservation techniques, particularly for digital information. The course covers various tools for gathering information from online sources, including website archiving and social media analysis. You will learn about data handling, secure communication, and methods for preserving digital information. The course's emphasis on data organization and investigation cycles may be relevant for archivists who manage and preserve historical records. The course's hacking context may be useful in uncovering hidden information.
Paralegal
A paralegal assists lawyers by preparing legal documents, conducting research, and organizing case files. Even though this course is on open source intelligence, it could be useful for paralegals who need to gather information from publicly available sources. The course teaches techniques such as open source searching, reverse searches, and social media investigations, which can be applied to legal research. You will learn how to collect and analyze data, identify relevant information, and present findings effectively. The material on data handling, secure communication, and ethical considerations is particularly important for paralegals working with sensitive legal information. The course's hacking context may be useful in identifying hidden assets.
Technical Writer
A Technical Writer creates technical documentation, user manuals, and other instructional materials. While this OSINT course focuses on open source intelligence, it could be useful for technical writers who need to research and understand technical concepts quickly. The course covers a wide range of tools and techniques for data collection and analysis. You will learn how to gather information from online sources, evaluate the credibility of sources, and present technical information in a clear and concise manner. The course's hacking context may be useful in understanding potential security threats. Given its niche focus, this course may be useful.

Reading list

We've selected two books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in OSINT: Open Source Intelligence.
Comprehensive guide to OSINT techniques, covering a wide range of tools and methodologies. It provides practical examples and real-world scenarios, making it an invaluable resource for anyone interested in OSINT. It is commonly used by industry professionals. This book adds depth to the course by providing detailed instructions and advanced techniques.
Provides a comprehensive overview of web application security vulnerabilities and how to exploit them. While not directly focused on OSINT, understanding these vulnerabilities can help you identify potential targets and gather information. This book is more valuable as additional reading than it is as a current reference. It is commonly used as a textbook at academic institutions and by industry professionals.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2025 OpenCourser