What Is Open Source Intelligence: OSINT Tools
Master OSINT techniques to find detailed information about people and companies. Learn how to analyze public data, uncover hidden connections, and conduct professional investigations using advanced search techniques, digital forensics, publicly available data, and intelligence-gathering tools.

What Youβll Learn
This OSINT Tools course will teach you:
- OSINT Investigation Techniques:
Learn how to find detailed relevant information using search engines, social media, and public records. - Tracing Digital Footprints:
Track individuals using email addresses, phone numbers, IP addresses, and images to generate actionable intelligence. - Social Media Intelligence:
Extract valuable insights from social media site like Facebook, Twitter, LinkedIn, and Instagram. - Google Dorking & Advanced Search Operators:
Perform deep searches to uncover hidden online data.
- Maltego for OSINT Investigations:
Build relationship maps between individuals, businesses, and digital assets. - Dark Web Research:
Discover hidden forums, marketplaces, and leaked information sources. - Spotting Fraud & Scammers:
Identify fake accounts, online scams, and social engineering tactics. - Privacy & Security Awareness:
Learn how to protect yourself from being tracked and having such information exposed.
Included in the βWhat Is Open Source Intelligenceβ Course
Suitable for the Following Careers
Course Content
Section 1 : Going undercover
Section 2 : Recruiting Intelligence Sources
Section 3 : How to Make Search Engines Talk
Section 4 : How to Interrogate Social Networks
Section 5 : Loading Heavy Guns
Audio Version of Training
OPEN FULL CURRICULUM
Requirements
Description of βWhat Is Open Source Intelligence: OSINT Tools and How to Find People Onlineβ
This course is designed to teach Open Source Intelligence (OSINT) techniques to track down individuals, investigate businesses, and uncover critical online information. Youβll gain hands-on experience using OSINT tools, advanced search operators, and social media intelligence techniques to locate hidden data and public records, verify identities, and analyze digital footprints.
Youβll explore OSINT methodologies, from tracing IP addresses and phone numbers to analyzing social media activity and conducting deep web investigations. The course also covers privacy and security strategies to help you protect your own information from being exposed. By the end of the training, youβll have the skills needed to find, analyze, and verify online raw data efficiently and ethically.
- Conduct OSINT investigations using search engines, public records, and online databases.
- Extract data from email addresses, phone numbers, and IP addresses.
- Investigate social media activity on Facebook, Twitter, LinkedIn, and Instagram.
- Use Maltego to map connections between people, businesses, and digital assets.
- Identify fake accounts, scammers, and online fraud.
- Perform image forensics to detect manipulated photos.
- Track Bitcoin transactions and financial trails.
- Use advanced search functions to discover actionable intelligence.
- Protect your own privacy and prevent exposure to OSINT tracking.
Whether youβre an investigator, cybersecurity professional, or just someone interested in learning how data can be found online, this course provides a comprehensive guide to modern intelligence-gathering methods.
Who Is This Course For
This course is ideal for investigators, security professionals, penetration testers, journalists, HR specialists, and law enforcement officers who need to conduct OSINT investigations. Itβs also perfect for anyone who wants to verify online identities, detect scams, or uncover valuable business intelligence.
Course Instructor
Serhii Nesterenko is a Cybersecurity Consultant, Penetration Tester, Trainer, Educator, and Writer with over 20 years of experience in security, including investigations, counter fraud, OSINT, and risk assessment. Active in cybersecurity since 2012, he has worked with top companies like Comodo and Deutsche Bank.
Serhii has authored numerous publications on security and counter-cyber espionage and co-authored books on intelligence agency activities and counter-fraud techniques. In 2018, he created video courses βCybersecurity Attacks (Red Team Activity)β and βCybersecurity: Methods of Protection (Blue Team Activity)β for Packt Publishing.
His extensive real-world experience and knowledge of information technologies and human psychology enable him to develop effective strategies against sophisticated cyberattacks. Serhii is dedicated to making the world safer and more secure by sharing his expertise through consulting, training, and writing.
Read More
Read Less
Testimonials
Jennifer R.
Very well presented, complete overview, with solid research tips and tricks. Better than I expected it would be based on the overview.
Chua Jin Tian
It was an interesting insight to the different places where information can be collected.
Tong Kah Jun
Content taught was very interesting, it showed me a whole new world on the possibility of the tools we use daily, as I never knew that Google (search engines) can be used for these things. I have also learnt about the different tools available to spot fake information online, and the tool used to help create the graph that links the different entities together.
Show More
Show Less