Group Purchasing
Group Purchasing

SEC497: Practical Open-Source Intelligence (OSINT)

SEC497Cyber Defense
  • 6 Days (Instructor-Led)
  • 36 Hours (Self-Paced)
Course authored by:
Matt Edmondson
Matt Edmondson
Course authored by:
Matt Edmondson
Matt Edmondson
  • GIAC Open Source Intelligence (GOSI)
  • 36 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Intermediate Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 29 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Learn to perform effective, secure OSINT research with practical techniques. Explore critical OSINT tools and apply your skills in hands-on labs based on real-world scenarios.

Course Overview

SEC497: Practical Open-Source Intelligence (OSINT) provides practical, real-world tools and techniques to help individuals perform OSINT research safely and effectively. The OSINT training course also offers real-world examples of how those tools and techniques have been used to solve a problem or further an investigation. Hands-on labs based on actual scenarios give students opportunities to practice the skills they learn and understand how those skills can help in their research.

What You’ll Learn

  • Perform OSINT investigations with strict OPSEC
  • Manage sock puppet accounts for research
  • Recover deleted or hidden data, including breach and dark web content
  • Trace digital footprints across sites and social media
  • Uncover website owners, linked domains, and metadata
  • Analyze large datasets and produce reports for cybersecurity, M&A, and more

Business Takeaways

  • Enhance competitive intelligence through OSINT techniques
  • Improve risk management by identifying vulnerabilities
  • Strengthen incident response with rapid information gathering
  • Identify and mitigate potential threats from publicly available data
  • Streamline data collection and analysis processes for operational efficiency

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC497: Practical Open-Source Intelligence (OSINT).

Section 1OSINT and OPSEC Fundamentals

Learn how to conduct OSINT safely and effectively. This section covers the OSINT process, avoiding analytical pitfalls, and managing OPSEC, including a hands-on Pre-Flight Checklist lab to understand what you expose online.

Topics covered

  • The OSINT Process
  • Avoiding Analytical Pitfalls
  • OPSEC and Attribution
  • Creating Accounts (Sock Puppets)
  • Hunchly, Obsidian, and Report Writing

Labs

  • OPSEC Pre-Flight Checklist
  • Dealing with Potential Malware
  • Canary Tokens
  • Hunchly and Obsidian
  • [Optional] Linux Command Line Practice

Section 2Essential OSINT Skills

Build core OSINT skills including search techniques, web data collection, and archiving. Learn how to analyze metadata, images, and translations, and use tools like ArchiveBox to capture and preserve online content.

Topics covered

  • Web Fundamentals and Search Engines
  • Web Archives and Proxy Sites
  • Collecting and Processing Web Data
  • Metadata, Mapping, and Image Analysis
  • Facial Recognition and Translations

Labs

  • ArchiveBox Web Capture Lab
  • Metadata Analysis
  • Reverse Image Search
  • Facial Recognition
  • Translation Techniques

Section 3Investigating People

Investigate individuals using usernames, emails, phone numbers, and social media. Learn to work with breach data, APIs, and detect AI-generated content while analyzing identity, behavior, and online presence.

Topics covered

  • Privacy and Identity Research
  • Usernames, Emails, and Phone Numbers
  • Breach Data and APIs
  • Social Media Analysis and Geolocation
  • Detecting AI-Generated Content

Labs

  • API Data Collection Lab
  • Breach Data Investigation Lab
  • Social Media Analysis
  • Geolocation
  • AI-Generated Content Detection

Section 4Investigating Websites and Infrastructure

Analyze websites, IPs, and infrastructure to answer key investigative questions. Learn how to uncover ownership, identify technologies, and understand how systems work to avoid missteps and strengthen analysis.

Topics covered

  • IP Addresses and Common Ports
  • WHOIS, DNS, and Certificate Transparency
  • Email Headers and Subdomains
  • Site Attribution and Ownership
  • Cloud and CTI Resources

Labs

  • IP Address Research
  • WHOIS and DNS
  • Amass and Eyewitness
  • Censys and Shodan
  • Buckets of Fun

Section 5Automation, the Dark Web, and Large Data Sets

Work with large datasets, explore the dark web, and automate OSINT tasks. Learn how AI tools like Whisper can speed up investigations and how to efficiently process massive amounts of data.

Topics covered

  • Researching Businesses and Wireless
  • Large Dataset Triage
  • Dark Web Investigation
  • AI for OSINT
  • Automation and Path Forward

Labs

  • Business and Wireless Analysis
  • Bulk Data Triage
  • Dark Web Exploration
  • Whisper Transcription Lab
  • Automation Techniques

Section 6Capture the Flag

Apply your skills in a multi-hour capture the flag. Work in teams to build a threat assessment for a fictional client using real-world data and techniques, then present findings for instructor feedback.

Things You Need To Know

Relevant Job Roles

Data Analysis (OPM 422)

NICE: Implementation and Operation

Responsible for analyzing data from multiple disparate sources to provide cybersecurity and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

Explore learning path

Protection

SCyWF: Protection And Defense

This role uses cybersecurity tools to protect information, systems and networks from cyber threats. Find the SANS courses that map to the Protection SCyWF Work Role.

Explore learning path

Threat Analysis (OPM 141)

NICE: Protection and Defense

Responsible for collecting, processing, analyzing, and disseminating cybersecurity threat assessments. Develops cybersecurity indicators to maintain awareness of the status of the highly dynamic operating environment.

Explore learning path

OSINT Investigator/Analyst

Cyber Defense

These resourceful professionals gather requirements from their customers and then, using open sources and mostly resources on the internet, collect data relevant to their investigation. They may research domains and IP addresses, businesses, people, issues, financial transactions, and other targets in their work. Their goals are to gather, analyze, and report their objective findings to their clients so that the clients might gain insight on a topic or issue prior to acting.

Explore learning path

Threat Intelligence (THIN)

Collection and contextual analysis of threat actor activity, indicators, and tactics. Outputs support detection engineering, hunting strategies, and proactive defence planning.

Explore learning path

Cybersecurity Researcher

European Cybersecurity Skills Framework

Research the cybersecurity domain and incorporate results in cybersecurity solutions.

Explore learning path

Course Schedule and Pricing

Have Questions?Contact Us
Showing 10 of 18

Benefits of Learning with SANS

Bryan Simon: Teacher Standing Next to Smartboard and Explaining Concept

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Close Up of Woman Holding a Pen and Documents

Get access to our range of industry-leading courses and resources