Operationalise OSINT

Course Details

Training Level: Beginner; Intermediate

Price

Early Bird: RM5,000 (Use Code: SS2024TEB. Ends 31st May, 2359H)
Normal: RM6,300

Course Abstract

This is a comprehensive course to level up on cybersecurity skills by focusing on Open Source Intelligence (OSINT). Covers essential principles, advanced techniques, and ethical considerations for gathering intelligence from publicly available information in support of investigation. Throughout this course, you will learn to collect information effectively, detect fake images, analyze social media data, reverse images search and identify deceptive online identities.

This is about finding meaningful information that is applicable to the intelligence question and being able to provide meaningful intelligence about the data collected.

You might use open-source information to do a credibility check before hiring someone for a job and to find out more about the person selling you something on Facebook marketplace.

Course Outline

  • What is and how to OSINT? Gathering, Searching and Analyzing.
    1. Understand What OSINT Is.
    2. The Goals of OSINT.
    3. How to OSINT?
      • The OSINT Frameworks.
      • Harvesting Web Data.
      • User Data/Name/Images and Reverse Images Searching.
        • User Data: Addresses, Phone Numbers, and Email Addresses.
        • User Data: Names, Images, Avatars, and Reverse Image Searches.
        • Additional Public Data.
  • Social media, Geolocation, Imagery OSINT. Networks, Government, and Business OSINT (With hand-on exercise).
    1. OSINT Search Engines.
    2. Social Media.
      • Facebook OSINT.
      • Instagram OSINT.
      • LinkedIn OSINT.
      • X (Formerly known as Twitter) OSINT.
    3. Geolocation.
    4. Imagery, Metadata, and Maps.
    5. Networks OSINT.
      • Remote Network Recon.
      • Finding Online Devices.
      • Government OSINT.
      • Companies OSINT.

Who should attend?

  • Cybersecurity Professionals
  • Law Enforcement and Intelligence Analysts
  • Digital Forensics Experts
  • Investigative Journalists
  • Law Firms
  • Cyber Threat Intelligence
  • Penetration Testers
  • Risk and Compliance Managers
  • Social Engineers

Prerequisites

  • Able to use a web browser.
  • Understand the function of the Internet and conduct effective online information research.

What to bring?

  • Laptop

Trainer Profile

Manh Pham

A young security researcher from Vietnam and founder of startup CYPeace. With over 5 years dedicated to Information Security. Passionate in penetration testing, web security, network security and cryptography. 

Technical Contributor to OWASP Foundation, responsible for OWASP Security Testing Guide: Write new test cases, reviewing test cases, discussion on tools and align OWASP Security Testing Guide with other OWASP documentations.

Nguyen Quang Minh

I bring over 4 years of experience in cybersecurity, specialising in vulnerability assessment, penetration testing, and exploitation. A proven track record of identifying and mitigating security risks across diverse technology and business domains. Extensive experience in web application exploitation and problem-solving, ensuring a practical and hands-on learning approach.

Scroll to top