OSINT for hackers and penetration testers
OSINT for hackers and penetration testers, available at $64.99, has an average rating of 4.35, with 86 lectures, based on 21 reviews, and has 292 subscribers.
You will learn about In this course I will be teaching you OSINT techniques focused for hackers This course is ideal for individuals who are Ethical hackers, network professionals, people that want to learn ethical hacking It is particularly useful for Ethical hackers, network professionals, people that want to learn ethical hacking.
Enroll now: OSINT for hackers and penetration testers
Summary
Title: OSINT for hackers and penetration testers
Price: $64.99
Average Rating: 4.35
Number of Lectures: 86
Number of Published Lectures: 86
Number of Curriculum Items: 86
Number of Published Curriculum Objects: 86
Original Price: $39.99
Quality Status: approved
Status: Live
What You Will Learn
- In this course I will be teaching you OSINT techniques focused for hackers
Who Should Attend
- Ethical hackers, network professionals, people that want to learn ethical hacking
Target Audiences
- Ethical hackers, network professionals, people that want to learn ethical hacking
In this course we will be learning about OSINT (reconnaissance) focused for ethical hacking and penetration testing. Int his course we will be building a virtual machine, loading Kali Linux, and leveraging a number of web based tools in order to identify and track our targets. OSINT is a critical skill to understand for any hacker and pentester. As always if you have any questions or issues, always feel free to let me know before, during, and even after the course.
FYI, a reminder: I not anyone that is a part of DGS has any affiliation with any of the vendors, software manufactures, or programmers in this course.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Introduction
Lecture 2: About me
Lecture 3: Disclaimer
Lecture 4: What will you need
Lecture 5: What is OSINT?
Lecture 6: Passive vs Active
Lecture 7: Data collection
Chapter 2: Setting up our virual machine
Lecture 1: Virtualization
Lecture 2: Install virtualbox
Lecture 3: Installing Kali linux
Chapter 3: Misc
Lecture 1: Linux basics
Lecture 2: Terminator
Lecture 3: Sock puppets
Chapter 4: Taking notes
Lecture 1: Cherry tree
Chapter 5: OSINT Basics
Lecture 1: The flowchart
Lecture 2: How much is too much data?
Chapter 6: hiding our identity
Lecture 1: Alias with Sudo
Lecture 2: 20 minute mail
Lecture 3: VPN
Chapter 7: Google
Lecture 1: Google search operators
Lecture 2: Google advanced
Lecture 3: Google images
Lecture 4: Exact match Google Images
Lecture 5: Google maps
Lecture 6: Google alerts
Chapter 8: Physical OSINT
Lecture 1: Dumpster diving
Chapter 9: Web OSINT
Lecture 1: Wayback machine
Lecture 2: wget
Lecture 3: Metagoofil
Lecture 4: URL Scan io
Lecture 5: Greynoise
Chapter 10: Phone OSINT
Lecture 1: Vishing
Lecture 2: Infophonega
Chapter 11: People OSINT
Lecture 1: pipl
Lecture 2: Family tree
Lecture 3: Dehashed
Lecture 4: Haveibeenpwned
Lecture 5: Maltego
Lecture 6: Canary token
Lecture 7: Family tree
Lecture 8: Hospital
Lecture 9: Instant Checkmate
Lecture 10: USA Public Data Search
Chapter 12: Social media OSINT
Lecture 1: Things to look for in social media
Lecture 2: Security questions
Lecture 3: Sherlock
Lecture 4: Hooktube
Lecture 5: Twint
Lecture 6: Instalooter
Chapter 13: Business OSINT
Lecture 1: Business searches
Lecture 2: Resume finders
Chapter 14: Networking OSINT
Lecture 1: ExhonoraTor
Lecture 2: Nmap
Lecture 3: Zenmap
Chapter 15: Password cracking with John
Lecture 1: John
Lecture 2: Dehashing
Lecture 3: Hashkiller
Lecture 4: Data dumps
Lecture 5: LeakSearch
Chapter 16: Firefox
Lecture 1: Changing other options
Lecture 2: Adding extensions
Lecture 3: Ublock origin
Lecture 4: Containers
Lecture 5: Wayback machine
Lecture 6: Fireshot
Lecture 7: Translate
Lecture 8: Video download helper
Lecture 9: Netcraft
Lecture 10: IP address and domain
Lecture 11: Firefox send
Chapter 17: Chrome
Lecture 1: Changing additional options
Lecture 2: Translate
Lecture 3: Chrome UA Spoofer
Lecture 4: Fireshot
Lecture 5: Video download helper
Lecture 6: Wayback machine
Lecture 7: Change Geolocation
Chapter 18: Car OSINT
Lecture 1: Carnet
Lecture 2: Car sticker OSINT
Chapter 19: Misinformation
Lecture 1: Identifying misinformation
Chapter 20: Finishing up
Instructors
-
Jeff Minakata
OSINT, IT Professional, ethical hacker, Indy Game dev
Rating Distribution
- 1 stars: 0 votes
- 2 stars: 1 votes
- 3 stars: 3 votes
- 4 stars: 8 votes
- 5 stars: 9 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Digital Marketing Foundation Course
- Google Shopping Ads Digital Marketing Course
- Multi Cloud Infrastructure for beginners
- Master Lead Generation: Grow Subscribers & Sales with Popups
- Complete Copywriting System : write to sell with ease
- Product Positioning Masterclass: Unlock Market Traction
- How to Promote Your Webinar and Get More Attendees?
- Digital Marketing Courses
- Create music with Artificial Intelligence in this new market
- Create CONVERTING UGC Content So Brands Will Pay You More
- Podcast: The top 8 ways to monetize by Podcasting
- TikTok Marketing Mastery: Learn to Grow & Go Viral
- Free Digital Marketing Basics Course in Hindi
- MailChimp Free Mailing Lists: MailChimp Email Marketing
- Automate Digital Marketing & Social Media with Generative AI
- Google Ads MasterClass – All Advanced Features
- Online Course Creator: Create & Sell Online Courses Today!
- Introduction to SEO – Basic Principles of SEO
- Affiliate Marketing For Beginners: Go From Novice To Pro
- Effective Website Planning Made Simple