0 0
Read Time:1 Minute, 30 Second
  • Introduction.
  • What is OSINT? and how to work without going beyond
  • legislation.
  • environment for work.
  • Github and tools.
  • Metadata
  • Collection of data about device vulnerabilities.
  • Collection of technical data.
  • Network security.
  • Search for an identity on the network and further deanonymization. Search in social networks and messengers Working with databases. Use of search engines and GEO-OSINT. The training comes with an OSINT-SAN PRO subscription for a year. Deepfacelive and much more, by the way, this is necessary for a random personality.

More details can be found in the pdf document.

Training is paid, the cost is 13k, like the first part. Number of seats 20, 2 already booked. Collection from 1st to 10th.

Welcome to the training, there are videos + documents in the course, in addition we have streams every other day, all the records will be, they will remain with you, an annual subscription to our framework osintsan is issued.

Course content OSINT-SAN Project 2.0

  1. What is OSINT? and how to work without going beyond the law.
  2. Introduction to training, division into sectors.
  3. Environment for work.
  4. Choosing an operating system
  5. Working with VPN/ proxy/ tor/
  6. Analysis, collecting data about you, when you search for data
  7. Github and tools.
  8. Working with Github and linux console.
  9. Selection of tools and solution of dependencies.
  10. Install all dependencies
  11. What do APIs eat, installation and use.
  12. In addition to the video, streams will also take place, in a day “We choose the time with the whole stream” we will analyze in detail the entire topic that is currently going on.
  13. List of software to install:
  14. Download:
  15. https://www.parrotsec.org/ https://cloud.mail.ru/public/XuQ7/mvzBABrEn
  16. osint git tools install on streame.
  17. Download and install:
  18. https://www.teamviewer.com/ru/ https://rus.windscribe.com/

@satana666mx

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence