If you’ve ever engaged in any sort of internet sleuthing—doing research on a company before an interview, looking up someone on social media before you meet them—then you’ve already engaged in some open-source intelligence, or OSINT. OSINT is, essentially, using publicly available information in an intelligence context. In this course, information security expert Mike Wylie shows how to effectively engage in OSINT, from the value of using it, to methods of gathering information. He covers topics like passive reconnaissance vs. active reconnaissance, methods for tracking organizations and employees, and crafting advanced search queries to find sensitive indexed information. If you’re conducting any kind of penetration test, OSINT provides a good foundation to get you started.
Learning Objectives
Learn how to effectively engage in OSINT.
Understand the difference between active and passive reconnaissance.
Learn to craft advanced search queries to find sensitive information.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- All-Source Analysis
- Cyber Investigation
- Threat Analysis
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.