• +45-23 28 11 42
  • info@scc-eu.dk

Cyber Security: OSINT

Cyber Security: OSINT

This post is also available in: enEnglish


Duration : 40 Hours

OSINT may often refer to international intelligence, armies and other authorized powers, but one can use OSINT also for criminal actions and business intelligence. The OSINT course provides an inside look and a deep understanding of this measure. It can be utilized for your own (legal) needs, as well as locating the flaws enable information gathering, and of course, prevention.



Target Audience

  • Military Organizations
  • Law Enforcement Personnel
  • Information Security Managers
  • IT Professionals
  • Cyber Crime Attorneys
  • Private investigators


Pre- requisites





Course Outline


Module 1: Introduction to Open Source Intelligence (OSINT)

  • Introduction to OSINT
  • The World Wide Web
  • Information and Intelligence
  • OSINT Tools
  • Free Databases and Paid Databases

Module 2: Google and Other Search Engines

  • Google Advanced Search
  • Geographic Information – Google Maps, Google Street View, IP Geo-Location
  • Google Images
  • The “Babylon Tower” – Searches in Different Languages. Legal Concerns and Privacy Issues
  • Other Search Engines: Bing, DuckDuck Go, Yasni, etc.
  • Specialized Search Engines and Tools: Yandex, Tineye, etc.

Module 3: Alternative Data and Operative Intelligence

  • Gathering Information in Unconventional Ways (But Still Legal Ways)
  • Local Databases
  • Operative Intelligence Guidelines

Module 4: The “Gold Mine” – Extracting Information from Social Networks

  • Introduction to Social Networks and Their Importance as an Information Source
  • Major Social Networks: Facebook, Linkedin, Twitter, Instagram
  • Information Leakage in Social Networks
  • Smaller Social Networks
  • Meta Searches in Social Networks
  • Finding a Person That Doesn’t Want to Be Found
  • Identity Verification in Social Networks

Module 5: Creating a Subject Profile

  • Practical Methods to Gather Information About an Individual
  • How to Write a Profile Report on an Individual

Module 6: Avatars

  • Identification of Avatars and False Virtual Identities
  • How to Create an Avatar

Module 7: The Dark Net – Workshop