Open-Source Intelligence (OSINT) Fundamentals

Learn the ins and outs of Open-Source Intelligence and step up your investigative game.

Training for a team or organization? Contact us about group access.

OSINT Fundamentals

Inside the Course

Scroll down to explore the skills you’ll build, the techniques you’ll master, and the requirements to get started.

Start Learning This Course Today

The All-Access Membership gives you unlimited access to this course, hands-on labs, and a complete library of cybersecurity training. Everything you need to build real-world skills is included.

Questions?

If you need clarification on the course or its requirements, simply use the chat button below and our team will assist you.

  • Difficulty: Beginner
  • Duration: 9h
  • Access: Included in Membership

Overview

This course focuses on Open-Source Intelligence (OSINT) tactics and techniques designed to help you improve your investigative game. Students should take this course if they want to learn:

  • OSINT Overview
  • Effective Notekeeping
  • Creating Sock Puppet Accounts
  • Basic and Advanced Search Engine OSINT
  • Image OSINT
  • Email Address OSINT
  • Breached Data OSINT
  • People OSINT
  • Phone Number OSINT
  • Username OSINT
  • Website OSINT
  • Social Media OSINT
  • Wireless Network OSINT
  • OSINT with Tools
  • Automating OSINT
  • Report Writing

Live Training Available for This Topic

Looking to go deeper? This course aligns with upcoming instructor-led sessions covering real-world applications and guided labs.

Objectives

Understand OSINT Techniques:

  • Gaining a better understanding of OSINT techniques

Develop an Investigative Skillset:

  • Improving investigative skillset

Develop a Research Methodology:

  • Improving overall research methodology

Protect Yourself:

  • Improving Personal OPSEC

System Requirements

Students need a PC that runs Windows, Mac OSX, or Linux. No specific memory or space requirements exist for this course.

Prerequisites

  • Prior Linux experience preferred
  • Prior virtualization knowledge preferred

Course Curriculum

  • Introduction
    • Introduction
    • Course Discord
    • Important Disclaimer
  • OSINT Overview
    • What is OSINT?
  • Note Keeping
    • Taking Effective Notes
  • Sock Puppets
    • Introduction to Sock Puppets
    • Creating Sock Puppets
  • Search Engine OSINT
    • Search Engine Operators
  • Image OSINT
    • Reverse Image Searching
    • Viewing EXIF Data
    • Physical Location OSINT
    • Identifying Geographical Locations
    • Where in the World… Part 1
    • Where in the World… Part 2
  • Email OSINT
    • Discovering Email Addresses
  • Password OSINT
    • Introduction
    • Hunting Breached Passwords Part 1
    • Hunting Breached Passwords Part 2
  • Username OSINT
    • Hunting Usernames and Accounts
  • People OSINT
    • Searching for People
    • Voter Records
    • Hunting Phone Numbers
    • Discovering Birthdates
    • Searching for Resumes
  • Social Media OSINT
    • Twitter OSINT Part 1
    • Twitter OSINT Part 2
    • Facebook OSINT
    • Instagram OSINT
    • Instagram OSINT Part 2
    • Snapchat OSINT
    • Reddit OSINT
    • LinkedIn OSINT
    • TikTok OSINT
  • Website OSINT
    • Website OSINT Part 1
    • Website OSINT Part 2
    • Website OSINT Part 3
  • Business OSINT
    • Hunting Business Information
  • Wireless OSINT
    • Wireless OSINT
  • Building an OSINT Lab
    • Building an OSINT Lab Part 1
    • Building an OSINT Lab Part 2
  • Working with OSINT Tools
    • Introduction
    • Image and Location OSINT
    • Hunting Emails and Breached Data
    • Username and Account OSINT
    • Phone Number OSINT
    • Social Media OSINT
    • Exploring OSINT Frameworks
    • Other Tools
  • OSINT Automation Foundations
    • Website OSINT Tools
    • Automating Website OSINT
  • Course Challenge
    • Course Challenge Overview
    • Course Challenge
    • Course Challenge Walkthrough
  • Case Studies
    • Introduction
    • Case Study: The Final Hours of Pop Smoke
    • Case Study: Influencer Home Tours
    • Case Study: Cooking Tutorials
  • OSINT Report Writing
    • Writing an OSINT Report
  • Conclusion & Additional Resources
    • Conclusion
    • Next Steps: Try a Certification!

This Course Is Included in Your All-Access Membership

One membership gives you ongoing access to OSINT Fundamentals, every other paid Academy course, and an active community of learners and mentors in Discord.

INSTRUCTORS

Meet Your Instructor

Learn from industry experts with real-world cybersecurity experience.

Instructor Heath Adams

Heath Adams

Hi everyone! My name is Heath Adams, but I also go by “The Cyber Mentor” on social media. I am the founder and CEO of TCM Security, an ethical hacking and cybersecurity consulting company. While I am an ethical hacker by trade, I love to teach! I have taught courses to over 170,000 students on multiple platforms, including Udemy, YouTube, Twitch, and INE.

I am currently OSCP, OSWP, eCPPTX, eWPT, CEH, Pentest+, CCNA, Linux+, Security+, Network+, and A+ certified.

I’m also a husband, animal dad, tinkerer, and military veteran. I hope you enjoy my courses.

Prepare for the Practical OSINT Research Professional (PORP) Exam

The PORP certification is designed to validate individuals’ skills in gathering intelligence from publicly available sources. It will assess the student’s ability to identify relevant information, analyze data, and draw insights from multiple sources.


Pair the OSINT Fundamentals course with the PORP exam to validate your skills with a recognized credential.

FAQS

Common Questions

Here are a couple of our most commonly asked questions, contact us if you don’t find an answer!

Can I get a refund if I'm unhappy with my purchase?
2
3

Yes. All courses come with a 24-hour money-back guarantee.

Will I receive a certificate of completion when I finish a course?
2
3

Yes. All courses come with a certificate of completion.

Do the courses count as Continuing Education Units (CEUs)?
2
3

Yes. Every certificate of completion comes with the total CEUs earned listed on the certificate.

What is the All-Access Membership?
2
3

As of July 1st, 2023 TCM Academy transitioned to a monthly subscription model, where you now receive full access to all of the courses on our platform for as long as your subscription remains active.

What if you already own courses on TCM Academy?
2
3

If you already own a course on our platform, you will continue to own that course. Previously owned courses will not be affected by this change.

I can see the course, but it won’t load or play. What should I do?
2
3

We use Cloudflare to protect our course platform and unfortunately, it does not play nice with VPNs. If you are experiencing issues, turn off your VPN and try again. If that does not solve the issue, please contact our support team at support@tcm-sec.com and we will help you out.

This course is included in our All-Access Membership, starting at $29.99/month.

Get full access to this course and our full course catalog when you enroll in our All-Access Membership.

Ready to level up your Cybersecurity Career?

Get unlimited access to every TCM Security Academy course, hands-on lab, and certification pathway with an All-Access Membership. Learn at your own pace, build real-world skills, and take the next step toward a career in cybersecurity.

PWPA