[Udemy] - Learn OSINT (Open-source Intelligence) From Scratch [2025]
Navigation X

[Big Banner Ad Space Available]
[Big Banner Ad Space Available]

[Udemy] - Learn OSINT (Open-source Intelligence) From Scratch [2025]

posted by Sauron and Last Post: 21 days ago


[Udemy] - Learn OSINT (Open-source Intelligence) From Scratch [2025]  2393
Sauron Moderator
3.684
Posts
3.561
Threads
Moderator
#1
Requirements
  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory.
  • Operating System: Windows / Apple Mac OS / Linux.
Description
Zaid and Saad tamed up to bring you the best OSINT course out there and get you certified as an Open Source Intelligence Professional. Combining Zaid's experience in ethical hacking and teaching over 1 million students world wide, with Saad's amazing and focused OSINT skills.
 
This course will teach you how to use Open Source Intelligence (OSINT) to gather information about anything. With no prior knowledge required, this course takes you from a beginner to an expert at performing advanced OSINT techniques, giving you the ability to gather information about individuals, companies, email addresses, phone numbers, social media accounts, physical locations, images and more.
 
Just like our other courses, this course is highly practical, but it won't neglect the theory. We'll start with the basics of open-source intelligence, then we'll dive and start using OSINT to investigate people, companies and individual pieces of information straight away. You'll learn everything by example, by gathering real information online — no boring dry lectures. By the end of the course, you will be an expert in open-source intelligence (OSINT).
 
To achieve this the course is divided into a number of sections,  each aims to teach you a specific OSINT technique. You'll first learn what is OSINT, why it is used, and who uses it. Then you'll learn how to use OSINT to find real information about targets, starting with just one piece of information (such as a name, email, username) and discovering all kinds of linked information such as hidden accounts, phone numbers, social media presence, leaked information, passwords and much more.
 
As we proceed, you will be introduced to different OSINT methodologies, tools, and techniques. Everything will be taught through examples and hands-on practicals—no useless or boring lectures!
 
All the techniques in this course are practical and work against real targets, you'll understand how to investigate each piece of information individually. Therefore by the end of the course you'll be able to start with any piece of information and carry out a full investigation to uncover rated data and information.
By the end of the course, you'll be able to modify these techniques to launch more sophisticated OSINT investigations and adapt them to suit different situations and scenarios.
 
Here are some of the topics that will be covered in the course:
  • People OSINT
  • Username OSINT
  • Phone OSINT
  • SOCMINT - Social Media OSINT
  • Maps and Satellite OSINT.
  • Image OSINT
  • Website OSINT
  • Search engines operators.
  • Custom search operators.
  • Searching with AI
  • Setting up an OSINT virtual machine
  • Creating a Sock Puppet account
  • Searching for leaked / breached databases
  • Downloading leaked / breached databases
  • Leveraging leaked / breached databases to find sensitive information.
  • Finding passwords in leaked / breached databases.
  • Scraping & downloading posts from Instagram, Tiktok, Snapchat, etc.
  • Finding hidden content, posts, comments, accounts, etc.
  • Discovering linked usernames, accounts, phone numbers, emails, etc.
  • Tracking phone numbers, images, online accounts, etc.
  • Investigating locations with various maps and satellite services
  • Discovering subdomains, hidden website owners, linked websites and more!
  • Using people search engines
  • Reverse image search
  • Geolocation of photos
  • AI image tracking
  • Manual image tracking
  • Facial recognition
  • Voter records lookup
  • Searching Wedding/Baby/Gift registries
  • OSINT automation.
  • Writing OSINT reports.
 
You'll use the following tools to achieve the above:
  • Tracelabs OSINT VM
  • True People search engine.
  • Phoneinfoga
  • Sherlock
  • Spiderfoot
  • Ghunt
  • Httprobe
  • Sublist3r
  • Instaloader
  • WPScan
  • Google Dorks
  • DorkGPT
  • Google Hacking Database GHDB
  • Exif Tool
  • DeHashed
  • LeakPeek
  • Breach Directory
  • Have I Been Pwned
  • IntelX Tools
  • VirtualBox
  • True People Search
  • OSINT Industries
  • CyberChef
  • OpenStreetMap (OSM)
  • DNSDumpster
  • Wayback Machine
  • FOCA
  • GeoSpy
  • Osintracker
     
 
Other topics:
  • Linux basics
  • Using the Linux terminal
  • Linux commands.
  • Installing virtual machines
 
With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.
 
Check out the curriculum and the course teaser for more info!
 
Notes:
  • This is the official course to prepare you for the C|OSINT|P (certified OSINT professional) certification.
  • This course is created for educational purposes only. Everything done through it is legal and relies on information that is publicly available on the internet.
Who this course is for:
  • Ethical Hackers
  • Security Professionals
  • Journalists
  • Private Investigators
  • Corporate Entities
  • Government Agencies
  • Anyone interested in learning how to gather information legally online using Open Source Intelligence (OSINT)
Hidden Content
You must register or login to view this content.

 Password:  LeakForum.io
Contact other staff members for help im no longer as active!
Reply
vulnhunter Junior Member
8
Posts
0
Threads
Junior Member
#2
(5 months ago)Sauron Wrote: Requirements
  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory.
  • Operating System: Windows / Apple Mac OS / Linux.
Description
Zaid and Saad tamed up to bring you the best OSINT course out there and get you certified as an Open Source Intelligence Professional. Combining Zaid's experience in ethical hacking and teaching over 1 million students world wide, with Saad's amazing and focused OSINT skills.
 
This course will teach you how to use Open Source Intelligence (OSINT) to gather information about anything. With no prior knowledge required, this course takes you from a beginner to an expert at performing advanced OSINT techniques, giving you the ability to gather information about individuals, companies, email addresses, phone numbers, social media accounts, physical locations, images and more.
 
Just like our other courses, this course is highly practical, but it won't neglect the theory. We'll start with the basics of open-source intelligence, then we'll dive and start using OSINT to investigate people, companies and individual pieces of information straight away. You'll learn everything by example, by gathering real information online — no boring dry lectures. By the end of the course, you will be an expert in open-source intelligence (OSINT).
 
To achieve this the course is divided into a number of sections,  each aims to teach you a specific OSINT technique. You'll first learn what is OSINT, why it is used, and who uses it. Then you'll learn how to use OSINT to find real information about targets, starting with just one piece of information (such as a name, email, username) and discovering all kinds of linked information such as hidden accounts, phone numbers, social media presence, leaked information, passwords and much more.
 
As we proceed, you will be introduced to different OSINT methodologies, tools, and techniques. Everything will be taught through examples and hands-on practicals—no useless or boring lectures!
 
All the techniques in this course are practical and work against real targets, you'll understand how to investigate each piece of information individually. Therefore by the end of the course you'll be able to start with any piece of information and carry out a full investigation to uncover rated data and information.
By the end of the course, you'll be able to modify these techniques to launch more sophisticated OSINT investigations and adapt them to suit different situations and scenarios.
 
Here are some of the topics that will be covered in the course:
  • People OSINT
  • Username OSINT
  • Phone OSINT
  • SOCMINT - Social Media OSINT
  • Maps and Satellite OSINT.
  • Image OSINT
  • Website OSINT
  • Search engines operators.
  • Custom search operators.
  • Searching with AI
  • Setting up an OSINT virtual machine
  • Creating a Sock Puppet account
  • Searching for leaked / breached databases
  • Downloading leaked / breached databases
  • Leveraging leaked / breached databases to find sensitive information.
  • Finding passwords in leaked / breached databases.
  • Scraping & downloading posts from Instagram, Tiktok, Snapchat, etc.
  • Finding hidden content, posts, comments, accounts, etc.
  • Discovering linked usernames, accounts, phone numbers, emails, etc.
  • Tracking phone numbers, images, online accounts, etc.
  • Investigating locations with various maps and satellite services
  • Discovering subdomains, hidden website owners, linked websites and more!
  • Using people search engines
  • Reverse image search
  • Geolocation of photos
  • AI image tracking
  • Manual image tracking
  • Facial recognition
  • Voter records lookup
  • Searching Wedding/Baby/Gift registries
  • OSINT automation.
  • Writing OSINT reports.
 
You'll use the following tools to achieve the above:
  • Tracelabs OSINT VM
  • True People search engine.
  • Phoneinfoga
  • Sherlock
  • Spiderfoot
  • Ghunt
  • Httprobe
  • Sublist3r
  • Instaloader
  • WPScan
  • Google Dorks
  • DorkGPT
  • Google Hacking Database GHDB
  • Exif Tool
  • DeHashed
  • LeakPeek
  • Breach Directory
  • Have I Been Pwned
  • IntelX Tools
  • VirtualBox
  • True People Search
  • OSINT Industries
  • CyberChef
  • OpenStreetMap (OSM)
  • DNSDumpster
  • Wayback Machine
  • FOCA
  • GeoSpy
  • Osintracker
     
 
Other topics:
  • Linux basics
  • Using the Linux terminal
  • Linux commands.
  • Installing virtual machines
 
With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.
 
Check out the curriculum and the course teaser for more info!
 
Notes:
  • This is the official course to prepare you for the C|OSINT|P (certified OSINT professional) certification.
  • This course is created for educational purposes only. Everything done through it is legal and relies on information that is publicly available on the internet.
Who this course is for:
  • Ethical Hackers
  • Security Professionals
  • Journalists
  • Private Investigators
  • Corporate Entities
  • Government Agencies
  • Anyone interested in learning how to gather information legally online using Open Source Intelligence (OSINT)
 

csint
Reply
nonuu Junior Member
3
Posts
0
Threads
Junior Member
#3
tank you sm
Reply
bobbby39 Junior Member
4
Posts
0
Threads
Junior Member
#4
great, thankyou :)
Reply
PickOsiris Junior Member
10
Posts
0
Threads
Junior Member
#5
(5 months ago)Sauron Wrote: Requirements
  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory.
  • Operating System: Windows / Apple Mac OS / Linux.
Description
Zaid and Saad tamed up to bring you the best OSINT course out there and get you certified as an Open Source Intelligence Professional. Combining Zaid's experience in ethical hacking and teaching over 1 million students world wide, with Saad's amazing and focused OSINT skills.
 
This course will teach you how to use Open Source Intelligence (OSINT) to gather information about anything. With no prior knowledge required, this course takes you from a beginner to an expert at performing advanced OSINT techniques, giving you the ability to gather information about individuals, companies, email addresses, phone numbers, social media accounts, physical locations, images and more.
 
Just like our other courses, this course is highly practical, but it won't neglect the theory. We'll start with the basics of open-source intelligence, then we'll dive and start using OSINT to investigate people, companies and individual pieces of information straight away. You'll learn everything by example, by gathering real information online — no boring dry lectures. By the end of the course, you will be an expert in open-source intelligence (OSINT).
 
To achieve this the course is divided into a number of sections,  each aims to teach you a specific OSINT technique. You'll first learn what is OSINT, why it is used, and who uses it. Then you'll learn how to use OSINT to find real information about targets, starting with just one piece of information (such as a name, email, username) and discovering all kinds of linked information such as hidden accounts, phone numbers, social media presence, leaked information, passwords and much more.
 
As we proceed, you will be introduced to different OSINT methodologies, tools, and techniques. Everything will be taught through examples and hands-on practicals—no useless or boring lectures!
 
All the techniques in this course are practical and work against real targets, you'll understand how to investigate each piece of information individually. Therefore by the end of the course you'll be able to start with any piece of information and carry out a full investigation to uncover rated data and information.
By the end of the course, you'll be able to modify these techniques to launch more sophisticated OSINT investigations and adapt them to suit different situations and scenarios.
 
Here are some of the topics that will be covered in the course:
  • People OSINT
  • Username OSINT
  • Phone OSINT
  • SOCMINT - Social Media OSINT
  • Maps and Satellite OSINT.
  • Image OSINT
  • Website OSINT
  • Search engines operators.
  • Custom search operators.
  • Searching with AI
  • Setting up an OSINT virtual machine
  • Creating a Sock Puppet account
  • Searching for leaked / breached databases
  • Downloading leaked / breached databases
  • Leveraging leaked / breached databases to find sensitive information.
  • Finding passwords in leaked / breached databases.
  • Scraping & downloading posts from Instagram, Tiktok, Snapchat, etc.
  • Finding hidden content, posts, comments, accounts, etc.
  • Discovering linked usernames, accounts, phone numbers, emails, etc.
  • Tracking phone numbers, images, online accounts, etc.
  • Investigating locations with various maps and satellite services
  • Discovering subdomains, hidden website owners, linked websites and more!
  • Using people search engines
  • Reverse image search
  • Geolocation of photos
  • AI image tracking
  • Manual image tracking
  • Facial recognition
  • Voter records lookup
  • Searching Wedding/Baby/Gift registries
  • OSINT automation.
  • Writing OSINT reports.
 
You'll use the following tools to achieve the above:
  • Tracelabs OSINT VM
  • True People search engine.
  • Phoneinfoga
  • Sherlock
  • Spiderfoot
  • Ghunt
  • Httprobe
  • Sublist3r
  • Instaloader
  • WPScan
  • Google Dorks
  • DorkGPT
  • Google Hacking Database GHDB
  • Exif Tool
  • DeHashed
  • LeakPeek
  • Breach Directory
  • Have I Been Pwned
  • IntelX Tools
  • VirtualBox
  • True People Search
  • OSINT Industries
  • CyberChef
  • OpenStreetMap (OSM)
  • DNSDumpster
  • Wayback Machine
  • FOCA
  • GeoSpy
  • Osintracker
     
 
Other topics:
  • Linux basics
  • Using the Linux terminal
  • Linux commands.
  • Installing virtual machines
 
With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.
 
Check out the curriculum and the course teaser for more info!
 
Notes:
  • This is the official course to prepare you for the C|OSINT|P (certified OSINT professional) certification.
  • This course is created for educational purposes only. Everything done through it is legal and relies on information that is publicly available on the internet.
Who this course is for:
  • Ethical Hackers
  • Security Professionals
  • Journalists
  • Private Investigators
  • Corporate Entities
  • Government Agencies
  • Anyone interested in learning how to gather information legally online using Open Source Intelligence (OSINT)
 

Reply
gdshell Junior Member
10
Posts
0
Threads
Junior Member
#6
(5 months ago)Sauron Wrote: Requirements
  • Basic IT Skills
  • No Linux, programming or hacking knowledge required.
  • Computer with a minimum of 4GB ram/memory.
  • Operating System: Windows / Apple Mac OS / Linux.
Description
Zaid and Saad tamed up to bring you the best OSINT course out there and get you certified as an Open Source Intelligence Professional. Combining Zaid's experience in ethical hacking and teaching over 1 million students world wide, with Saad's amazing and focused OSINT skills.
 
This course will teach you how to use Open Source Intelligence (OSINT) to gather information about anything. With no prior knowledge required, this course takes you from a beginner to an expert at performing advanced OSINT techniques, giving you the ability to gather information about individuals, companies, email addresses, phone numbers, social media accounts, physical locations, images and more.
 
Just like our other courses, this course is highly practical, but it won't neglect the theory. We'll start with the basics of open-source intelligence, then we'll dive and start using OSINT to investigate people, companies and individual pieces of information straight away. You'll learn everything by example, by gathering real information online — no boring dry lectures. By the end of the course, you will be an expert in open-source intelligence (OSINT).
 
To achieve this the course is divided into a number of sections,  each aims to teach you a specific OSINT technique. You'll first learn what is OSINT, why it is used, and who uses it. Then you'll learn how to use OSINT to find real information about targets, starting with just one piece of information (such as a name, email, username) and discovering all kinds of linked information such as hidden accounts, phone numbers, social media presence, leaked information, passwords and much more.
 
As we proceed, you will be introduced to different OSINT methodologies, tools, and techniques. Everything will be taught through examples and hands-on practicals—no useless or boring lectures!
 
All the techniques in this course are practical and work against real targets, you'll understand how to investigate each piece of information individually. Therefore by the end of the course you'll be able to start with any piece of information and carry out a full investigation to uncover rated data and information.
By the end of the course, you'll be able to modify these techniques to launch more sophisticated OSINT investigations and adapt them to suit different situations and scenarios.
 
Here are some of the topics that will be covered in the course:
  • People OSINT
  • Username OSINT
  • Phone OSINT
  • SOCMINT - Social Media OSINT
  • Maps and Satellite OSINT.
  • Image OSINT
  • Website OSINT
  • Search engines operators.
  • Custom search operators.
  • Searching with AI
  • Setting up an OSINT virtual machine
  • Creating a Sock Puppet account
  • Searching for leaked / breached databases
  • Downloading leaked / breached databases
  • Leveraging leaked / breached databases to find sensitive information.
  • Finding passwords in leaked / breached databases.
  • Scraping & downloading posts from Instagram, Tiktok, Snapchat, etc.
  • Finding hidden content, posts, comments, accounts, etc.
  • Discovering linked usernames, accounts, phone numbers, emails, etc.
  • Tracking phone numbers, images, online accounts, etc.
  • Investigating locations with various maps and satellite services
  • Discovering subdomains, hidden website owners, linked websites and more!
  • Using people search engines
  • Reverse image search
  • Geolocation of photos
  • AI image tracking
  • Manual image tracking
  • Facial recognition
  • Voter records lookup
  • Searching Wedding/Baby/Gift registries
  • OSINT automation.
  • Writing OSINT reports.
 
You'll use the following tools to achieve the above:
  • Tracelabs OSINT VM
  • True People search engine.
  • Phoneinfoga
  • Sherlock
  • Spiderfoot
  • Ghunt
  • Httprobe
  • Sublist3r
  • Instaloader
  • WPScan
  • Google Dorks
  • DorkGPT
  • Google Hacking Database GHDB
  • Exif Tool
  • DeHashed
  • LeakPeek
  • Breach Directory
  • Have I Been Pwned
  • IntelX Tools
  • VirtualBox
  • True People Search
  • OSINT Industries
  • CyberChef
  • OpenStreetMap (OSM)
  • DNSDumpster
  • Wayback Machine
  • FOCA
  • GeoSpy
  • Osintracker
     
 
Other topics:
  • Linux basics
  • Using the Linux terminal
  • Linux commands.
  • Installing virtual machines
 
With this course you'll get 24/7 support, so if you have any questions you can post them in the Q&A section and we'll respond to you within 15 hours.
 
Check out the curriculum and the course teaser for more info!
 
Notes:
  • This is the official course to prepare you for the C|OSINT|P (certified OSINT professional) certification.
  • This course is created for educational purposes only. Everything done through it is legal and relies on information that is publicly available on the internet.
Who this course is for:
  • Ethical Hackers
  • Security Professionals
  • Journalists
  • Private Investigators
  • Corporate Entities
  • Government Agencies
  • Anyone interested in learning how to gather information legally online using Open Source Intelligence (OSINT)
 

Reply
laon0901 Junior Member
7
Posts
0
Threads
Junior Member
#7
(5 months ago)Sauron Wrote: [font][font]요구 사항[/font][/font]
  • [font][font]기본 IT 기술[/font][/font]
  • [font][font]리눅스, 프로그래밍 또는 해킹에 대한 지식은 필요하지 않습니다.[/font][/font]
  • [font][font]최소 4GB RAM/메모리가 장착된 컴퓨터.[/font][/font]
  • [font][font]운영체제: Windows / Apple Mac OS / Linux.[/font][/font]
[font][font]설명[/font][/font]
[font][font]Zaid와 Saad는 최고의 OSINT 과정을 제공하고 오픈소스 정보 전문가 자격증을 취득할 수 있도록 최선을 다합니다. Zaid의 윤리적 해킹 경험과 전 세계 백만 명 이상의 학생들을 가르친 Saad의 놀랍고 집중적인 OSINT 기술을 결합했습니다.[/font][/font]
 
[font][font]이 과정에서는 오픈소스 인텔리전스(OSINT)를 활용하여 무엇이든 정보를 수집하는 방법을 배웁니다. 사전 지식이 전혀 없어도 초보자부터 고급 OSINT 기법 수행 전문가까지, 개인, 회사, 이메일 주소, 전화번호, 소셜 미디어 계정, 물리적 위치, 이미지 등에 대한 정보를 수집할 수 있는 능력을 키울 수 있습니다.[/font][/font]
 
[font][font]다른 과정들과 마찬가지로 이 과정도 매우 실용적이지만, 이론도 소홀히 하지 않습니다. 오픈소스 정보의 기본부터 시작하여 OSINT를 활용하여 사람, 기업, 그리고 개별 정보를 바로 조사하는 방법을 익힙니다. 지루하고 딱딱한 강의가 아닌, 실제 온라인 정보를 수집하고 사례를 통해 모든 것을 배우게 됩니다. 과정을 마치면 오픈소스 정보(OSINT) 전문가가 될 것입니다.[/font][/font]
 
[font][font]이를 위해 본 과정은 여러 섹션으로 나뉘며, 각 섹션은 특정 OSINT 기법을 가르치는 것을 목표로 합니다. 먼저 OSINT가 무엇이고, 왜 사용되는지, 그리고 누가 사용하는지 배웁니다. 그런 다음 OSINT를 사용하여 대상에 대한 실제 정보를 찾아내는 방법을 배우게 됩니다. 이름, 이메일, 사용자 이름 등 단 하나의 정보부터 시작하여 숨겨진 계정, 전화번호, 소셜 미디어 활동, 유출된 정보, 비밀번호 등 다양한 종류의 연결된 정보를 발견합니다.[/font][/font]
 
[font][font]수업이 진행됨에 따라 다양한 OSINT 방법론, 도구, 그리고 기법들을 소개받게 됩니다. 모든 내용은 예시와 실습을 통해 배우게 되며, 지루하거나 쓸모없는 강의는 없습니다![/font][/font]
 
[font][font]이 과정의 모든 기법은 실용적이며 실제 대상에 적용 가능하므로, 각 정보를 개별적으로 조사하는 방법을 이해하게 될 것입니다. 따라서 과정을 마칠 때쯤이면 어떤 정보든 시작하여 완전한 조사를 수행하여 평가된 데이터와 정보를 밝혀낼 수 있게 될 것입니다.[/font][/font]
[font][font]과정을 마치면 이러한 기술을 수정하여 더욱 정교한 OSINT 조사를 시작하고 다양한 상황과 시나리오에 맞게 조정할 수 있게 됩니다.[/font][/font]
 
[font][font]이 과정에서 다룰 주제는 다음과 같습니다.[/font][/font]
  • [font][font]사람들 OSINT[/font][/font]
  • [font][font]사용자 이름 OSINT[/font][/font]
  • [font][font]전화 OSINT[/font][/font]
  • [font][font]SOCMINT - 소셜 미디어 OSINT[/font][/font]
  • [font][font]지도 및 위성 OSINT.[/font][/font]
  • [font][font]이미지 OSINT[/font][/font]
  • [font][font]OSINT 웹사이트[/font][/font]
  • [font][font]검색 엔진 운영자.[/font][/font]
  • [font][font]사용자 정의 검색 연산자.[/font][/font]
  • [font][font]AI로 검색하기[/font][/font]
  • [font][font]OSINT 가상 머신 설정[/font][/font]
  • [font][font]Sock Puppet 계정 생성[/font][/font]
  • [font][font]유출/침해된 데이터베이스 검색[/font][/font]
  • [font][font]유출/침해된 데이터베이스 다운로드[/font][/font]
  • [font][font]유출되거나 침해된 데이터베이스를 활용하여 민감한 정보를 찾습니다.[/font][/font]
  • [font][font]유출되거나 침해된 데이터베이스에서 비밀번호를 찾는 방법.[/font][/font]
  • [font][font]Instagram, TikTok, Snapchat 등에서 게시물을 스크래핑하고 다운로드합니다.[/font][/font]
  • [font][font]숨겨진 콘텐츠, 게시물, 댓글, 계정 등을 찾습니다.[/font][/font]
  • [font][font]연결된 사용자 이름, 계정, 전화번호, 이메일 등을 발견합니다.[/font][/font]
  • [font][font]전화번호, 이미지, 온라인 계정 등을 추적합니다.[/font][/font]
  • [font][font]다양한 지도와 위성 서비스를 이용한 위치 조사[/font][/font]
  • [font][font]하위 도메인, 숨겨진 웹사이트 소유자, 링크된 웹사이트 등을 찾아보세요![/font][/font]
  • [font][font]사람 검색 엔진 사용[/font][/font]
  • [font][font]역방향 이미지 검색[/font][/font]
  • [font][font]사진의 지리적 위치[/font][/font]
  • [font][font]AI 이미지 추적[/font][/font]
  • [font][font]수동 이미지 추적[/font][/font]
  • [font][font]얼굴 인식[/font][/font]
  • [font][font]유권자 기록 조회[/font][/font]
  • [font][font]결혼/아기/선물 레지스트리 검색[/font][/font]
  • [font][font]OSINT 자동화.[/font][/font]
  • [font][font]OSINT 보고서 작성.[/font][/font]
 
[font][font]위의 목표를 달성하려면 다음 도구를 사용하세요.[/font][/font]
  • [font][font]Tracelabs OSINT VM[/font][/font]
  • [font][font]True People 검색 엔진.[/font][/font]
  • [font][font]폰인포가[/font][/font]
  • [font][font]셜록[/font][/font]
  • [font][font]거미발[/font][/font]
  • [font][font]귄트[/font][/font]
  • [font][font]Httprobe[/font][/font]
  • [font][font]하위 목록3r[/font][/font]
  • [font][font]인스타로더[/font][/font]
  • [font][font]WPScan[/font][/font]
  • [font][font]구글 도크스[/font][/font]
  • [font][font]도크GPT[/font][/font]
  • [font][font]구글 해킹 데이터베이스 GHDB[/font][/font]
  • [font][font]Exif 도구[/font][/font]
  • [font][font]해시됨[/font][/font]
  • [font][font]리크피크[/font][/font]
  • [font][font]침해 디렉토리[/font][/font]
  • [font][font]내가 Pwned 되었나요?[/font][/font]
  • [font][font]IntelX 도구[/font][/font]
  • [font][font]버추얼박스[/font][/font]
  • [font][font]진정한 사람 검색[/font][/font]
  • [font][font]OSINT 산업[/font][/font]
  • [font][font]사이버셰프[/font][/font]
  • [font][font]오픈스트리트맵(OSM)[/font][/font]
  • [font][font]DNS덤프스터[/font][/font]
  • [font][font]웨이백 머신[/font][/font]
  • [font][font]포카[/font][/font]
  • [font][font]지오스파이[/font][/font]
  • [font][font]오신트래커[/font][/font]
     
 
[font][font]기타 주제:[/font][/font]
  • [font][font]리눅스 기본[/font][/font]
  • [font][font]Linux 터미널 사용[/font][/font]
  • [font][font]리눅스 명령어.[/font][/font]
  • [font][font]가상 머신 설치[/font][/font]
 
[font][font]이 과정에서는 24시간 연중무휴 지원을 받으실 수 있습니다. 질문이 있으시면 Q&A 섹션에 게시하시면 15시간 이내에 답변해 드리겠습니다.[/font][/font]
 
[font][font]자세한 내용을 보려면 커리큘럼과 과정 티저를 확인하세요![/font][/font]
 
[font][font]참고사항:[/font][/font]
  • [font][font]이 과정은 C|OSINT|P(인증 OSINT 전문가) 자격증 취득을 준비하기 위한 공식 과정입니다.[/font][/font]
  • [font][font]본 과정은 교육 목적으로만 제작되었습니다. 본 과정을 통해 이루어지는 모든 내용은 합법적이며, 인터넷에 공개된 정보를 기반으로 합니다.[/font][/font]
[font][font]이 과정은 누구를 위한 것인가요?[/font][/font]
  • [font][font]윤리적 해커[/font][/font]
  • [font][font]보안 전문가[/font][/font]
  • [font][font]언론인들[/font][/font]
  • [font][font]사립탐정[/font][/font]
  • [font][font]법인체[/font][/font]
  • [font][font]정부 기관[/font][/font]
  • [font][font]OSINT(오픈 소스 인텔리전스)를 사용하여 합법적으로 온라인에서 정보를 수집하는 방법을 배우는 데 관심이 있는 사람[/font][/font]
 

Reply
DARK23563 Member
27
Posts
3
Threads
Member
#8
(5 months ago)Sauron Wrote: [font]Ty[/font]

Reply
0xE9 Member
66
Posts
0
Threads
Member
#9
Tyyyyyyyyyy
Reply
mikeraj428 Junior Member
3
Posts
0
Threads
Junior Member
#10
(5 months ago)Sauron Wrote:  
Good content
Reply


Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)