Open Source Intelligence and Investigation
CSI Linux Open Source Intelligence (OSINT) Investigation
In this course, we will be diving into the world of online investigations and research, and how to use Open Source Intelligence (OSINT) techniques to gather valuable information. We will cover everything from the base process of investigations, to preserving online evidence, and even utilizing AI challenges. By the end of the course, you will have the skills and knowledge necessary to conduct your own online investigations.
Here is what you can expect from each section of the course:
What is OSINT?
In this section, we will define OSINT and its importance in today's world. You will learn how OSINT techniques and tools can be used to gather information that is publicly available and freely accessible.
Base Process of Investigations
We will cover the basics of investigations, including how to set up an investigation, how to preserve online evidence, and how to identify and track phone numbers and IP addresses.
Preserving Online Evidence
In this section, we will discuss how to preserve online evidence, including what to look for when collecting data and how to document your findings.
Phone Numbers and Info
We will explore the various tools and techniques that you can use to gather information about phone numbers and other personal information.
IP addresses, Proxies, and VPNs
We will discuss how to identify and track IP addresses, proxies, and VPNs, and the importance of anonymity when conducting online investigations.
DNS, Domains, and Subdomains
We will explore the various tools and techniques you can use to gather information about DNS, domains, and subdomains, and the importance of understanding this information for online investigations.
Importance of Anonymity
We will discuss the importance of anonymity when conducting online investigations and how to protect yourself while online.
Online Investigation Subjects
In this section, we will explore the various types of online investigation subjects, including misinformation, disinformation, and deception.
Setting up an Online Web Persona - Sock Puppet
We will discuss the process of setting up a fake online persona (or "sock puppet") and how it can be used in online investigations.
Using your Sock Puppet Persona to Investigate
We will explore how to use your sock puppet persona to conduct investigations, including how to interact with other users and gather information.
Language Translation Options
We will discuss the various language translation options available to you, and how they can be used to gather information from non-English sources.
We will cover the various tools and techniques you can use to collect information from websites, including website crawlers and web scraping tools.
3rd Party Commercial OSINT Apps
In this section, we will discuss the various 3rd-party commercial OSINT apps available to you, and how they can be used to gather information.
OSINT Frameworks (tools)
We will explore the various OSINT frameworks and tools that are available, and how they can be used to streamline your online investigation.
Tracking changes on websites
We will discuss how to track changes to websites and receive alerts when changes are made.
Public Records Searches
We will explore the various tools and techniques you can use to search public records, including online databases and archives.
In this section, you will learn how to use geolocation tracking to gather information about an individual or location. You’ll learn about different tools and techniques, including GPS tracking and IP tracking.
Online Investigations With Images
In this section, you will learn how to use images to gather information about an individual or location. You’ll learn about reverse image searches, facial recognition software, and more.
Social Media Sites
In this section, you will learn how to use social media sites such as Facebook, Twitter, and LinkedIn to gather information about an individual or location. You’ll learn about different techniques, including social media scraping, and how to use the information you gather.
Video Evidence Collection
In this section, you will learn how to use video evidence to gather information about an individual or location. You’ll learn about different video sources, such as security cameras, and how to use the information you gather.
In this section, you will learn about the basics of cryptocurrency, including Bitcoin, and how it can be used in OSINT investigations. You’ll learn about different tools and techniques for tracking cryptocurrency transactions.
In this section, you will learn about the challenges and opportunities posed by artificial intelligence in OSINT investigations. You’ll learn about different AI tools and techniques, including machine learning, and how to use them effectively.
Writing the Report
In this section, you will learn about the key components of a successful OSINT report. You’ll learn about different types of reports, including criminal investigations, and how to write a report that is clear, concise, and persuasive.
In this section, you will learn from real-life OSINT investigations. You’ll learn about different types of cases, including missing persons, and how OSINT was used to solve them.
Practicing OSINT and Resources
In this section, you will learn about different resources and tools that can help you in your OSINT investigations. You’ll also have the opportunity to practice your OSINT skills and receive feedback from your instructor.
So, are you ready to dive into the world of OSINT? Get started today and let’s start gathering information!
Social Media Intelligence and Investigation
CSI Linux SOCMINT
This course's goal is to gather information on a suspect or target using their Social Media information. Do you want to know what your competitors or enemies know about you? These are the same techniques we use during the reconnaissance or OSINT process but focus directly on the target's Social Media presence.
The modules included are Importance of Anonymity, Base Process of Investigations, Preserving Online Evidence, Online Investigation Subjects, setting up a Sock Puppet, 3rd Party Commercial Apps, Terms of Service Challenges, tracking changes and getting alerts, Online Investigations with Images, Facebook, Twitter, Instagram, and others, Dating Sites, using your persona to investigate, Writing the Report, Case Studies, Practicing OSINT and Resources, and more
Dark Web Investigation
CSI Linux Dark Web Investigation Certification Course
You will learn about the basics of Dark Web investigations, including Dark Markets, Crypto Currency, tools to connect to Tor & I2P, and resources to help you investigate activity over Dark Web networks. The main goal is to help gather and preserve evidence for court.
The modules in this course cover: What is the Darknet/Dark Web, Preserving Online Evidence, Base Process of Investigations, Importance of Anonymity, Connecting to Tor, Navigating the Dark Web (Tor), De-Anonymizing Tor, Other Onion Routing Dark Nets, Setting up a Dark Web Persona, What is Crypto Currency, Dark Web Investigation Subjects, Resources, Writing the Report, Case Studies, and more.
You will also be prepared to take the Certified Dark Web Investigator (CDWI) test.
Incident Response and Risk Management
This is a CSI Linux Incident Response and CompTIA Cybersecurity Analyst+ (CySA+) combined course. In this course, you will learn everything you need to know to pass the CySA+ along with gaining key skills that will allow you to test security and identify risks. It is suggested you use CSI Linux because there are many labs in this course.
The CompTIA Cybersecurity Analyst+ examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.”
- This course will teach you the fundamental principles of using threat and vulnerability analysis tools plus digital forensic tools
- Aimed at IT professionals with (or seeking) job roles such as IT Security Analyst, Security Operations Center (SOC) Analyst, Vulnerability Analyst, Cybersecurity Specialist, Threat Intelligence Analyst, and Security Engineer
- Identify tools and techniques to use to perform an environmental reconnaissance of a target network or security system.
- Collect, analyze, and interpret security data from multiple log and monitoring sources.
- Use network host and web application vulnerability assessment tools and interpret the results to provide effective mitigation.
- Understand and remediate identity management, authentication, and access control issues.
- Participate in a senior role within an incident response team and use forensic tools to identify the source of an attack.
- Understand the use of frameworks, policies, and procedures and report on security architecture with recommendations for effective compensating controls