Passive reconnaissance, Shodan, Maltego, WHOIS, Google Dorks, people and company intelligence gathering.
Why this matters right now
OSINT — the first step of any cyberattack and investigation
After the course you will be able to
Not abstract knowledge — concrete skills you can demonstrate in an interview
Real investigations in the course
Every lesson is built on real investigations and Bug Bounty cases
Twitter Bitcoin Scam 2020
OSINT investigators uncovered the identities of hackers who compromised accounts of Obama, Musk and Biden by tracing digital footprints in Discord, GitHub and public records.
Bellingcat: identifying GRU agents
Bellingcat identified GRU agents through flight tickets, hotels, phones and leaked databases. Only public data — no hacking involved.
Bug Bounty: $15k for SubDomain Takeover
A researcher found a forgotten company subdomain pointing to a non-existent S3 bucket via OSINT, claimed it and received a $15,000 reward.
Course Program
3 modules · 12 lessons · from Google Dorks to Maltego and the final OSINT report
Where this course leads
MC-07 — a foundational skill for three in-demand cybersecurity specializations
OSINT Analyst
Gather intelligence on targets from open sources for pentests and investigations.
Threat Intelligence
Analyze threats, track APT groups and provide analytics for SOC and management.
Pentester
Use OSINT as the first phase of a pentest to gather target information and find entry points.
Who this course is for
OSINT Analysts
Want to systematize your knowledge and master professional reconnaissance tools
Pentesters
Want to strengthen the recon phase and find more attack surface before active engagement
Bug Bounty
Looking for subdomains, leaks and forgotten company assets to find vulnerabilities
Master OSINT
and target recon
today
12 lessons, Shodan, Maltego and hands-on practice on real targets.
OSINT & Reconnaissance
Level: beginner

