OSINT training, tutorials, manuals, and videos are essential resources for those interested in collecting and analyzing open intelligence for intelligence, investigative, and cybersecurity purposes. These resources help you learn effective methods of using open sources such as social networks, databases, geolocation data and others to obtain valuable information. OSINT training provides participants with an understanding of techniques for gathering and analyzing data from a variety of sources. This includes skills in working with search engines, using specialized tools and techniques for analyzing large volumes of information. OSINT manuals and guides provide step-by-step guidance on the use of various tools and techniques.
They help beginners to successfully collect and analyze open information, and help more experienced users improve their skills. OSINT video tutorials are visual materials that demonstrate real-world examples of using OSINT techniques and tools. It can be screen recordings, demonstrations of working with programs, analysis of specific scenarios, and others. Video lessons allow you to better understand how to apply theoretical knowledge in practice. Overall, OSINT training, tutorials, manuals, and videos create an indispensable resource for anyone who wants to improve their open intelligence gathering and analysis skills. They help to work effectively with a large volume of data and identify valuable connections and patterns in information from various sources.
Quick and easy to watch videos on Open Source Intelligence (OSINT) skills and techniques.
Why web capture is extremely useful for online investigations.
I’m a hacker by profession, but this channel will have different tutorials from time to time and even off topic.
We focus on creating videos for the budding ethical hacker, computer geek, and IT community.
A playlist that includes Open Source Intelligence (OSINT) tools and how they work and are used.
Independent organization focused on developing and supporting open solutions in the field of cyber security.
Redefining the approach to accessing the Internet. The Silo Web Isolation Platform executes all web code on secure cloud servers, ensuring that web threats never touch trusted resources.
The OSINT At Home series is useful for those looking to find the digital breadcrumbs and pick up some open source intelligence (OSINT) techniques, digital investigations, and good old fashioned plain research.
Welcome to Drop In And Learn (DIAL), where every week we discuss OSINT tools and techniques, as well as the critical thinking skills needed by online intelligence and investigative practitioners.
I’m Sofia and this is my channel. I’m a senior OSINT analyst who really likes to explain things. My work focuses on monitoring countries with ongoing conflicts and a history of human rights violations. I am an expert in finding and collecting data, analyzing it.
As a leading computer security training organization, SANS Institute is known for providing intensive, immersive training designed to help you and your employees learn the practical actions needed to secure systems and networks.
OS2INT is Strategy Nord’s training and development consultancy, which was developed to meet the ever-increasing demands of corporate, government, defense and law enforcement organizations for advanced OSINT capabilities.
Being OSINT-inquisitive is just that; you have this urge to click on everything you find (barring malicious links and emails of course!) and you want to investigate how a tool or script works and why it does what it does. It is exploratory curiosity that helps people succeed in the world of OSINT or Open-Source Intelligence.
OSINT Dojo is a free project that aims to help those new to Open Source Intelligence (OSINT) through the first steps of their OSINT journey. On this Youtube channel we will be uploading training content including OSINT tools, methodology and challenges to improve and test your skills.
A very high overview of the various data points that can be collected to go from a malicious artifact (file, URL, email, SMS, etc.) to more revealing information (IP addresses, domains, URLs, certificates, hashes, strings, metadata, etc.) to better understand and/or track the artifact.