What Is OSINT: Open Source Intelligence Course Part 2
Continue mastering open-source intelligence (OSINT) with advanced techniques used by security professionals, intelligence analysts, and ethical hackers. Learn data collection, intelligence gathering, and operational security while exploring the dark web, business intelligence, encryption, and social engineering to assess security risks.

What Youβll Learn
This Open Source Intelligence Course will teach you:
- OSINT Cycle & Data Collection:
Learn advanced data gathering techniques for intelligence agencies, government organizations, and security professionals. - Dark Web Investigations:
Explore onion sites, Tor networks, and hidden web pages to collect actionable insights. - Public Records & Business Intelligence:
Extract business, financial, and legal data using open-source intelligence techniques. - Social Engineering & Misinformation:
Use psychological manipulation, phishing tactics, and social media monitoring to gather information and detect threats. - Encryption & Operational Security:
Understand data security, encryption keys, and password protection to defend against security risks.
- Threat Intelligence & Cyber Defense:
Identify threat actors, IP addresses, and network vulnerabilities using OSINT tools. - Sock Puppet Accounts & Social Media OSINT:
Create and manage fake identities to research Twitter, Facebook, Instagram, and Reddit. - Vehicle & Criminal Investigations:
Perform license plate lookups, criminal background checks, and offender searches with OSINT techniques. - Plagiarism & Fake News Detection:
Use OSINT research to identify misinformation, assess online sources, and verify news authenticity. - Machine Learning & AI in OSINT:
Analyze publicly available data using artificial intelligence, automation, and advanced algorithms.
Included in the Open Source Intelligence Course
Suitable for the Following Careers
Course Content
Training Overview
Setting up our virtual machine with Virtualbox
Checklist
Website crawling tools
Social Engineering
Home ownership
Encryption
Canary Tokens
Nmap and Zenmap
User name Lookup
Searching code
VPN
Criminal checks
Additional Twitter tools
Additional Facebook tools
Plagiarism Check
Sock puppets
Dating
Other people search
Politics
Businesses
Bitcoin
Vehicle
Darkweb
Images
Investigations
Identifying misinformation
In closing
Audio Version of Training
OPEN FULL CURRICULUM
Requirements
Description of What Is OSINT Training
This course is the continuation of Part 1, diving deeper into the world of open-source intelligence (OSINT). Learn how threat actors, cyber defenders, and intelligence agencies use OSINT tools for data collection, risk assessment, and national security investigations.
Through real-world scenarios and hands-on training, youβll explore business intelligence, privacy risks, dark web investigations, and security analysis while enhancing your operational security and intelligence-gathering skills.
- Perform deep web and dark web research using Tor and specialized OSINT tools.
- Collect sensitive data from publicly available sources, web pages, and social media platforms.
- Identify threat actors, cyber vulnerabilities, and business security risks.
- Use AI-driven OSINT techniques, encryption tools, and machine learning for cybersecurity investigations.
- Investigate criminal records, phone numbers, IP addresses, and open ports for intelligence gathering.
By the end of this comprehensive OSINT training, youβll have advanced intelligence skills applicable to cybersecurity, government agencies, private sector security, and national security investigations.
Who Is This Course For
Security professionals, cyber defenders, intelligence analysts, business intelligence researchers, law enforcement officers, and anyone interested in OSINT techniques, cyber defense, and security operations.
Course Instructor
Jeff M has over 19 years of IT experience and has designed, programmed, and published games on Android, Chrome, PC, Windows Phone, Windows OS, OSX, and Linux platforms. He is proficient in programming languages such as HTML5, C++, Python, and Visual Basic. Jeff has completed EC Council CEH 8 & 9 certification courses and holds certifications including CWA, Certified Accredited Engineer, CISP, and Metasploit.
He has published security articles in Hackin9 Magazine and eForensics Magazine. In 2010, he co-founded Disposable Games Studio, aiming to create games and apps for gamers, IT professionals, and everyday users. Jeff is also passionate about training and security, having delivered talks and training sessions on OSINT and ethical hacking.
Read More
Read Less
Testimonials

Dennis S.
After the first OSINT Course (Part 1) I was already convinced. And the second Course really dives deeper into so many OSINT topics and even adds a lot of new ones. Couldn't be happier with it : )

Richard Q.
Good compliment to the OSINT Part 1 course. Lots of useful websites and resources.

Mark K.
I work in the transportation industry, so I'm not doing OSINT per say. But its helped sharpen my searching for information for my reports and my non work life also. Great courses, great presentations.
Show More
Show Less
Jeff M
