Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Advanced Open Source Intelligence Course
Welcome & Learning Approach
First Steps... (1:30)
Open Source Intelligence Fundamentals (updated 04/04/2024)
What is Open Source Intelligence (OSINT) (2:24)
Working with OSINT (10:05)
The Open Source Intelligence Cycle (4:44)
Planning Considerations (7:27)
Collection and Processing (4:38)
Analysis and Dissemination (28:24)
Understanding Online Attribution
The OSINT Platform (14:35)
Internet Protocol (IP) and User Agent Strings (2:46)
Websites and Cookies (2:36)
Browser Fingerprinting (3:03)
Putting It All Together
Developing an Attribution Assessment for the Online Environment
Operational Security in the Online Environment
Online Environment and Entity Appreciation
Risk Appreciation
Implementing OPSEC Measures for your Specific Online Environment
Information Searching Essentials (updated 10/05/2024)
Managing Your Information Requirements When Working in OSINT (1:07)
Capturing Content (5:41)
Boolean Searching (2:40)
Advanced Google Searching (Dorking) (18:17)
Searching in Native Language and Country Perspectives (4:47)
Reverse Image Searching (13:01)
Contact Validation with Emails (10:52)
Username Correlation (17:28)
People Search Engines (21:55)
Person of Interest Collection
Facebook (47:30)
Facebook 2021 (21:15)
X (Twitter) (30:56)
Instagram (39:49)
Vkontakte (16:54)
TikTok (30:29)
Telegram (21:27)
LinkedIn (27:38)
MeWe (37:32)
YouTube (21:43)
Social Network Analysis
Cross Platform Social Network Analysis (36:00)
Image and Video Analysis
Obtaining EXIF Data (17:52)
Reverse Image Searching (With Tools) (12:37)
Image Analysis Techniques (22:23)
Video Analysis (15:21)
Geolocating Images and Videos (39:27)
Australian OSINT
Australian Information Sources & Collection (79:43)
Corporate Profiling
Company Structures (68:41)
Profiling Technical Artefacts (DNS, IPs, Technology Builds, Documents) (37:44)
Domain Enumeration & Visualisation (17:35)
Trade Activity (13:00)
Area of Interest Monitoring
Social Media Monitoring (55:34)
CCTV Monitoring (12:04)
Transport Monitoring (Air, Land, Sea) (18:16)
Advanced Mapping (25:05)
Region Assessments
Overview (19:15)
News, Topics & Trends (17:42)
Threat Actors (20:36)
Health Activity (8:47)
NGO Activity (13:08)
Event Monitoring
Finding & Investigating (22:09)
Alerts & Triggers (18:23)
Tactics, Techniques & Procedures
Tactics, Techniques & Procedures Overview (8:54)
Tactics, Techniques & Procedures Analysis - Paste sites & Forums (25:24)
Scraping Tools for OSINT
An Overview of Web Scraping
Scraping with Dataminr (10:05)
Scraping with SimpleScraper (9:18)
Parsehub GUI for Scraping (7:16)
Applying Generative AI to OSINT
What is Generative AI (12:42)
Access to Generative AI Tools
Using Generative AI For OSINT (16:45)
Illuminating the Dark Web & Cryptocurrency (Introduction)
An Overview of Tor & Other Dark Nets (12:21)
Network and Client Attribution (22:44)
Establishing Your OSINT Environment (24:55)
Ingress into the Dark Web: Google Dorking, Dark Web Directories and Bookmarks (19:35)
Introduction to Cryptocurrency (14:20)
Workflows to Manage and Minimise Confronting Digital Material
When OSINT Isn't Great for Us
What is Distressing Content and Reactions
What Hinders? What Helps?
Practical Steps For Viewing Graphic Content: Before, During and After (6:30)
Leaders: Responsibilities and Resources (2:22)
Course Conclusion
Thank you & Next Steps... (1:05)
Analysis and Dissemination
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock