Learn Google Dorking, Social Media OSINT, Leaked Databases, Anonymity, Website Recon, Image OSINT & More!
Sub Category
- Network & Security
{inAds}
Objectives
- Build a secure OSINT investigation lab from scratch using VMWare and Kali Linux
- Stay completely anonymous online by creating sock puppets and setting up a private VPN server
- Master advanced search techniques and uncover hidden information using Google Dorking
- Hunt for emails, trace usernames, and analyze data from real-world password leaks and breaches
- Find, download, and explore massive leaked databases from platforms like Facebook, Twitter, and LinkedIn
- Trace any phone number to find its owner's identity and linked social media accounts
- Conduct in-depth social media investigations on Instagram, Facebook, TikTok, Twitter, and LinkedIn
- Analyze images to extract metadata and pinpoint exact geographic locations using AI
- Use tools like Shodan and Censys to discover exposed IoT devices and vulnerable webcams online
- Perform complete website reconnaissance to find hidden subdomains, technologies, and historical data
- Learn to hide your own data and files using advanced steganography and file encryption techniques
- Track and analyze emails to identify senders and deconstruct phishing attempts in a hands-on challenge
Pre Requisites
- No experience required. Perfect for Beginners
FAQ
- Q. How long do I have access to the course materials?
- A. You can view and review the lecture materials indefinitely, like an on-demand channel.
- Q. Can I take my courses with me wherever I go?
- A. Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
{inAds}
Coupon Code(s)