Size: 3.18 GB

Description

In this course we will be continuing our learning and understanding of OSINT. If you took my previous course ( OSINT: Open-Source Intelligence For hackers, investigators, and everyone else) then this will be a continuation from that. In this course we continue learning about additional tools along with the how and why. We create burner accounts for OSINT, criminal background checks, vehicle lookups, using Kali Linux for OSINT, and much more.

This course is ideal for hackers, pentesters, investigators, HR, and everyone else. I appreciate that you are taking a look and hopefully joining this course. I work hard to provide great content and support. Feel free to check out my original OSINT course if you haven’t already and preview the videos and read the reviews.

before, during and even after you take the course I will do my best to help you out with any questions that you have.

Happy hunting!

FYI, a reminder: I not anyone that is a part of DGS has any affiliation with any of the vendors, software manufactures, or programmers in this course.

Who this course is for:

  • Anyone that wishes to continue learning OSINT, investigators, network security professionals, or OSINT investigators that wish to build off of their basic/novice skillset.

Requirements

  • A basic understanding of OSINT and techniques or students from my previous OSINT course.

What you’ll learn

  • In this course students will learn more advance OSINT techniques, learn about social engineering to aid in OSINT investigations and more

HOMEPAGE – https://www.udemy.com/course/osint-open-source-intelligence-level-2/

Free Download Links-

Note: Comment below if you find any link dead or getting problem in downloading files.

You May Also Like

Performing OSINT Gathering on Employee Targets
Linux Security and Hardening, The Practical Security Guide.
OSINT: Open-Source Intelligence
Categories: CoursesSecurity

2 Comments

spiff · September 11, 2021 at 1:00 am

links are broken

Leave a Reply

Your email address will not be published. Required fields are marked *