[nectar_btn size="jumbo" button_style="see-through-2" color_override="#ffffff" hover_color_override="#ffffff" hover_text_color_override="#000000" icon_family="none" url="/events/" text="View Available Training Events"]
[divider line_type="No Line" custom_height="20"]

The Practical Open Source Intelligence for Everyday Social Engineers course reveals the techniques, tricks and tools used by Social-Engineer’s professional penetration testers. Attendees learn how to extract powerful, freely available information. Whether you’re an investigator, researcher, penetration tester, intelligence analyst, or an everyday social engineer, this course is for you.

The Practical Open Source Intelligence for Everyday Social Engineers is a hands-on, 2-day course. Attendees learn how to strategically search, categorize, and organize information. Our instructors use real world examples to demonstrate the use of advance technologies with investigations. This course also demonstrates how to use uncovered information to dredge for additional data, as well as craft and launch realistic social engineering attacks.

[image_with_animation image_url="6749" animation="Fade In" hover_animation="none" alignment="" border_radius="none" box_shadow="none" image_loading="default" max_width="100%" max_width_mobile="default"]
What the two days will cover

Leverage natural skills, explore advanced tools usage, and develop the mindset necessary to perform corporate investigations.

Having the information is important, but it’s essential to know how to use it. During these two days we will cover how to:
[fancy-ul icon_type="standard_dash" color="Accent-Color" alignment="left" spacing="default" enable_animation="true"]
  • Use non-technical mechanisms to gather OSINT
  • Conduct search queries with a variety of search engines
  • Employ techniques for obfuscating traffic
  • Execute in-depth searches of social networks
  • Identify social networks in use by your targets
  • Search geo-location data on social networks
  • Reverse search photographs
[/fancy-ul]
[fancy-ul icon_type="standard_dash" color="Accent-Color" alignment="left" spacing="default" enable_animation="true"]
  • Leverage satellite imagery and street views
  • Discover important documents related to a target
  • Leverage information from subjects related to a target
  • Organize, categorize and prioritize data
  • Administer uncovered information to craft realistic attacks
  • The course ends with a REAL live action OSINT exercise
[/fancy-ul]
[fancy-ul icon_type="standard_dash" color="Accent-Color" alignment="left" spacing="default" enable_animation="true"]
  • Penetration testers
  • Red teams
  • Sales persons
  • Everyday social engineers with an interest in learning how to mine the internet for data relevant to them
[/fancy-ul]
[fancy-ul icon_type="standard_dash" color="Accent-Color" alignment="left" spacing="default" enable_animation="true"]
  • Penetration testers and red teams
  • Online Investigators
  • Law Enforcement, Military and Government Employees
  • Researchers
  • Risk Management Professionals
  • Sales and Business Development Professionals
  • Competitive Intelligence Professionals
[/fancy-ul]
[templatera id="7546"]
[divider line_type="Small Line" line_alignment="center" line_thickness="1" divider_color="accent-color" animate="yes" delay="300"]