OSINT: Open-Source Intelligence & SOCMINT: Social Media INT

- Description
- Curriculum
- FAQ
- Reviews
Immerse yourself in the exciting world of OSINT (Open Source Intelligence) and SOCMINT (Social Network Intelligence) through this intensive basic course Level 1, composed of 07 modules designed for intelligence analysts and professionals in Cyber Intelligence and Cybersecurity.
This course is categorized as 20% theory and 80% practical, where you will learn the general definitions, contexts, case studies and real situations in each module, which will prepare you to face the most complex challenges of today’s digital environment.
Each session of the course focuses on a topic that any analyst and researcher should be familiar with, from the investigation of suspicious accounts on social networks to the identification of profiles organizing protests and hate speech on platforms such as Facebook and Twitter. Also using advanced techniques such as Google Dorks, database analysis and de-anonymization tools.
In addition, this course focuses exclusively on the use of critical thinking, i.e. the use of logic, reasoning and curiosity, to uncover criminal activities, prevent risks in corporate networks and protect digital security.
The course excels in the optimal learning of investigation methodologies on specific targets in OSINT (user names, phone numbers, emails, identification of persons), as well as for the investigation of social networks as part of SOCMINT (Facebook, Instagram and X (former Twitter).
-
2Mock Exam: OSINT/SOCMINT Research and Analysis Skills AssessmentQuiz
This mock exam is designed to test your knowledge and skills in the use of OSINT and SOCMINT investigative techniques. Through a series of practical and theoretical questions, we will test your ability to identify, analyze and manage critical information in a digital investigative environment. This exercise will prepare you to face real challenges in the field of cyber intelligence. Good luck!
-
3Intelligence Fundamentals and OSINT in the Modern ContextVideo lesson
In this first module, you will delve into the fundamental concepts that every analyst and investigator must master. We will explore the key principles of Intelligence, Cyber Intelligence, Open Source, Open Source Intelligence (OSINT) and Social Network Intelligence (SOCMINT), and how these integrate into your training as an analyst.
This module will provide you with an in-depth understanding of the Open Source environment in the 21st century, highlighting its impact in the real world and how to manage legal boundaries in OSINT and SOCMINT practice. In addition, we will discuss the benefits and challenges presented by OSINT, the intelligence analysis cycle and the different levels of OSINT use, all accompanied by case studies that will allow you to apply and hone your analytical skills in real-world situations.
Upon completion of this module, you will be prepared to face the complex challenges of intelligence analysis with a critical perspective and a solid theoretical foundation, ready to be applied in real-world scenarios. This is the first step towards building an analytical profile that is distinguished by your ability to navigate and extract valuable information in an increasingly challenging digital environment.
-
4Fingerprints and Privacy ProtectionVideo lesson
In this module, we will go deeper into securing your digital identity, addressing clearly and precisely the different types of digital footprints we leave in the online environment.
You will learn to identify and understand these traces, which are crucial to protect your privacy.
In addition, we will introduce you to the concept in a different way, solving some cases with real situation to realize the importance of OSINT in this very indispensable module.
-
5What data do social networks collect from their users?Video lesson
In this module we will talk about social networks and what data they collect about their users, including personal information, locations, interests, interactions and online behaviors.
This data that makes up our digital footprints, a trail that can be analyzed to extract valuable information. For an intelligence analyst or investigator, understanding what data is collected and how it is used is critical to assess risk, protect privacy, and leverage the information for more accurate and effective investigations.
-
6Fingerprint Protection and EgosurfingVideo lesson
In this module, we will explore in depth Egosurfing, a crucial technique for performing self searches and evaluating your exposure on the Internet. Through practical examples, you will learn how to protect your identity and privacy, ensuring that your activities as an analyst or cyber investigator are secure and discreet.
We will also address digital footprint protection, with an emphasis on investigative techniques and digital avatar planning. You will learn how to create secure investigative profiles and use advanced resources, such as artificial intelligence image generation, to strengthen your online presence without compromising your privacy. This module will give you the tools you need to operate confidently and securely in the digital world.
-
7Navigators and Essential Tools for OSINT and SOCMINTVideo lesson
In this module, we will explore the market share of browsers and their relevance to OSINT and SOCMINT research. We will analyze unique browsers such as Brave and Mozilla Firefox, along with indispensable add-ons that optimize open source research.
You will also learn how to use OSINT in the cloud with tools such as Google Cloud Shell, maximizing the efficiency of your searches. We'll address the risks and threats associated with information gathering, including real-world examples that illustrate the dangers of doxing in its illegal application. With practical examples, you will be prepared to address and mitigate these risks while conducting safe and effective investigations.
-
9Search and Geolocation (GEOINT) of Persons through OSINT and SOCMINTVideo lesson
In this module, you will learn how to use OSINT and SOCMINT to search for people in the vast digital environment, facing the challenge of homonymy on the Internet. We will explore techniques to geolocate individuals using fingerprinting, Image Intelligence (IMINT) and tools such as My Maps as part of Geospatial Intelligence (GEOINT), allowing you to accurately track and locate people.
In addition, we will analyze real cases and situations that will show you how to apply these techniques in practical contexts. This module will provide you with the necessary skills to identify and locate people effectively, overcoming the challenges presented by today's digital world.
-
10Facial Face Analysis and Research through OSINT and SOCMINTVideo lesson
In this module, we will delve into image analysis and investigation as part of Image Intelligence (IMINT), including techniques to improve the resolution of photographs for forensic investigation. You will learn how to use tools to search for people through images and explore key OSINT resources to improve the accuracy of your searches.
We will also address the risks and threats associated with searching for people through imagery, providing practical examples to solve real cases. This module will equip you with essential skills to handle and analyze imagery in the context of OSINT and SOCMINT investigations.
-
11Metadata: Analysis and Extraction for OSINT ResearchVideo lesson
In this module, we will delve into the concept and importance of metadata in OSINT investigations. Metadata reveals key information about a file, such as who created or modified it, when, where and with what device. These answers are critical to a thorough analysis.
We will explore desktop applications and online tools for extracting metadata from both files and websites. In addition, you will learn how to use resources that allow you to analyze metadata history over time, with practical examples for applying these techniques in real investigations.
-
12Steganography: Hidden Techniques in Digital ResearchVideo lesson
In this module, we will explore the use of steganography in the context of OSINT, a technique for hiding information within digital files. We will start with a general definition of steganography and its relevance in the digital domain.
You will learn how to use specific tools to detect and apply steganography, with practical examples showing their actual use in investigations. This module will equip you with the knowledge necessary to identify and leverage hidden techniques in your digital investigations, expanding your skills as an OSINT analyst.
-
13Image Intelligence (IMINT)Video lesson
In this module, we will delve into Image Intelligence (IMINT) and its application in OSINT investigations. You will learn how to perform reverse image searches, an essential technique for verifying the authenticity of images and detecting possible forgeries.
We will explore indispensable resources for performing reverse searches effectively, with a focus on how these tools can help you identify fake images and verify visual information in real-world contexts. This module will provide you with the skills necessary to critically manage and analyze images, ensuring that your investigations are accurate and reliable.
-
14OSINT Applied to USERNAMESVideo lesson
In this module, you will delve into the use of OSINT to achieve specific objectives, applying your knowledge in the execution of real cases. You will learn how to use historical search engines and specialized resources to track usernames over time.
In addition, we will delve into the forensic search of Telegram users and channels, as well as the forensic investigation of accounts on Telegram and X (formerly Twitter). We will provide you with additional resources to enrich your investigations, equipping you with advanced tools for thorough and accurate analysis in the digital realm.
-
15OSINT Applied to EMAILSVideo lesson
In this module, you will learn how to use OSINT to achieve specific objectives from emails. We will explore real cases that demonstrate how to trace and analyze information linked to emails using specific search engines for data breaches and make your digital investigation successful.
In addition, we will teach you how to employ OSINT resources to search for people through their emails and how to perform forensic search to extract and analyze critical data. This module will provide you with the tools and techniques necessary to conduct thorough email-focused investigations, enhancing your ability as an OSINT analyst.
-
16OSINT Applied to TELEPHONESVideo lesson
In this module, you will learn how to use OSINT to achieve specific objectives from phone numbers. We will explore real cases that demonstrate how to track and analyze information linked to phone numbers using applications such as Telegram Bots, caller ID applications, among others.
In addition, we will teach you how to employ OSINT resources to search for people through their phone numbers and how to perform forensic search to extract and analyze critical data. This module will provide you with the tools and techniques necessary to conduct thorough investigations focused on phone numbers, enhancing your ability as an OSINT analyst.
-
17Definitions, Practices and Management of User Identity (ID) in Social NetworksVideo lesson
In this module, we will explore the general definitions of SOCMINT and its real-world relevance. You will learn about the specialties of SOCMINT, the importance of preserving your identity for investigating user accounts on social networks, and the risks associated with malpractice in saving digital evidence.
We will focus on user identification (ID) and how to obtain account IDs on platforms such as Facebook, X (Twitter), Instagram, TikTok and LinkedIn. We will also discuss the data breach in SOCMINT and execute real cases to apply these concepts in practical situations. This module will provide you with the necessary skills to effectively manage and analyze information in social networks.
-
18SOCMINT Applied to FACEBOOKVideo lesson
In this module, we will explore how to apply SOCMINT specifically to Facebook. You will learn how to monitor groups on this social network and employ advanced research techniques, including web scraping methods to efficiently collect data.
We will discuss the data breach in the context of SOCMINT and how to use this information in real cases. This module will provide you with practical tools and essential knowledge to conduct thorough and effective investigations on Facebook, enhancing your social media intelligence skills.
-
19SOCMINT Applied to X (Twitter)Video lesson
In this module, we will address the use of SOCMINT applied to the social network X (Twitter). We will explore the platform's new privacy policies and how they impact research.
You will learn how to use essential resources to match X users with data breaches, and how to apply techniques to investigate user accounts in X. In addition, we will conduct case studies to put these concepts into practice in real-world situations. This module will equip you with key skills to conduct effective X investigations.
-
20SOCMINT Applied to INSTAGRAMVideo lesson
In this module, we will explore the application of SOCMINT on Instagram. You will learn advanced techniques for user account analysis and research, using specialized resources to obtain and analyze data.
We will focus on web scraping methods to collect information, as well as tools to detect the date and time of user posts on Instagram. We will also run case studies to apply these methods in real situations, strengthening your skills in social media research.

External Links May Contain Affiliate Links read more