Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Advanced Open Source Intelligence Course
Welcome & Learning Approach
First Steps... (1:10)
Open Source Intelligence Fundamentals
What is Open Source Intelligence (OSINT) (2:19)
Working with OSINT (10:01)
The Open Source Intelligence Cycle (4:36)
Planning Considerations (7:27)
Collection and Processing (4:38)
Analysis and Dissemination (23:02)
Developing an Intelligence Issue
Identify the issue (1:39)
Refine intelligence questions (1:53)
Research and Collection Plans (6:51)
Analyse and Identify Key Points (3:03)
Draw out the implications (5:06)
Communicating Analysis for Impact
What is impact and setting up for success (6:53)
Effective means of intelligence communication (5:56)
Understanding Online Attribution
The OSINT Platform (14:07)
Internet Protocol (IP) and User Agent Strings (2:46)
Websites and Cookies (2:36)
Browser Fingerprinting (3:03)
Putting It All Together
Developing an Attribution Assessment for the Online Environment
Operational Security in the Online Environment
Online Environment and Entity Appreciation
Risk Appreciation
Implementing OPSEC Measures for your Specific Online Environment
Information Searching Essentials
Managing Your Information Requirements When Working in OSINT (1:07)
Capturing Content (5:39)
Boolean Searching (2:44)
Advanced Google Searching (Dorking) (16:59)
Searching in Native Language and Country Perspectives (12:24)
Reverse Image Searching (8:04)
Contact Validation with Emails (10:40)
Username Correlation (13:34)
People Search Engines (16:15)
Social Media Collection (Person of Interest Searching) Updated July 2024
Searching Social Media Without Accounts (8:28)
Saving Images From Social Media (6:32)
Navigating Obstructive Web Elements Using Developer Tools (4:49)
Facebook (27:52)
Instagram and Using Third Party Tools (8:18)
X (Twitter) (30:56)
Searching TikTok (11:59)
Reddit (12:11)
YouTube (19:16)
Understanding and Investigating Telegram (13:18)
What is Vkontakte? (4:22)
LinkedIn (6:29)
Social Network Analysis
What is Social Networking Analysis (9:12)
Using Tabulated Data to Analyse Connections on Facebook (9:22)
Cross Platform Analysis (9:12)
Image and Video Analysis
Obtaining EXIF Data (17:52)
Reverse Image Searching (With Tools) (12:37)
Image Analysis Techniques (22:23)
Video Analysis (15:21)
Geolocating Images and Videos (39:27)
Australian and Country Specific OSINT
Australian People: Lookup Sites (12:20)
Australian Assets: Vehicles and Property (12:19)
Australian Business Profiling and Relationships (11:38)
Corporate Profiling
Company Structures (68:41)
Profiling Technical Artefacts (DNS, IPs, Technology Builds, Documents) (37:44)
Domain Enumeration & Visualisation (17:35)
Trade Activity (13:00)
Area of Interest Monitoring
CCTV Monitoring (12:04)
Transport Monitoring (Air, Land, Sea) (18:16)
Advanced Mapping (25:05)
Region Assessments
Overview (19:15)
News, Topics & Trends (17:42)
Threat Actors (20:36)
Health Activity (8:47)
NGO Activity (13:08)
Event Monitoring
Finding & Investigating (22:09)
Alerts & Triggers (18:23)
Tactics, Techniques & Procedures
Understanding Adversary TTPs Through OSINT (8:07)
Tactics, Techniques & Procedures Analysis - Paste sites & Forums (12:20)
Forums - Reddit, Gab and 4Chan (4:38)
Scraping Tools for OSINT
An Overview of Web Scraping
Scraping with Dataminr (10:05)
Scraping with SimpleScraper (9:18)
Parsehub GUI for Scraping (7:16)
Applying Generative AI to OSINT
What is Generative AI (12:42)
Access to Generative AI Tools
Prompting 1 - Basics and Quick Tips
Prompting 2 - Providing Structure
Prompting 3 - Advanced Techniques
Testing, Evaluating and Iterating Prompts (16:45)
Illuminating the Dark Web & Cryptocurrency (Introduction)
An Overview of Tor & Other Dark Nets (12:21)
Network and Client Attribution (22:44)
Establishing Your OSINT Environment (24:55)
Ingress into the Dark Web: Google Dorking, Dark Web Directories and Bookmarks (19:35)
Introduction to Cryptocurrency (14:20)
Workflows to Manage and Minimise Confronting Digital Material
When OSINT Isn't Great for Us
What is Distressing Content and Reactions
What Hinders? What Helps?
Practical Steps For Viewing Graphic Content: Before, During and After (6:30)
Leaders: Responsibilities and Resources (2:22)
Course Conclusion
Thank you & Next Steps... (1:05)
Browser Fingerprinting
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock