Next Level OSINT w/ Mishaal Khan
October 18 @ 8:30 am – 5:00 pm MDT
Course Length: 16 Hours
Format: In-Person Only
Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation.
- In-Person: $1,095
Includes In-Person Conference Ticket
Clicking this button will take you to Cvent to complete your registration.
Whether you’re performing background checks, researching partners or competitors, hunting missing persons or criminals, getting leverage on lawsuits, or becoming a better ethical hacker, this course takes you through advanced online investigative techniques to boost your efforts. It also provides examples of offline search techniques and how to think outside the box. Every technique is explained extensively with live examples. There are plenty of smart hacks and techniques you can utilize to get some unexpected and useful information.
The course progresses from basic to very advanced practical OSINT techniques that you can use in your investigative routine. No special software, operating system, or paid licenses are required. Bookmarks for all tools and websites used will be provided for quick access.
Topics Covered Include:
- Investigate using seed information like usernames, phone numbers, names, or emails.
- Learn to pivot to new information
- Utilize different search engines for varying results
- Validate using government records
- Use APIs for deeper information gathering
- Use automation for quicker searches across a broader spectrum
- Search through breached data
- Identify hidden accounts using correlation
- Create a mind map of data
- Create and maintain sock puppet accounts
- Compile a report
Who should attend this training and what are the key take aways:
Anyone interested in digging up information or performing fast online searches should take this course. Some professional fields that utilize OSINT in their jobs include Pentesters, Threat Hunters, Journalists, Investigators, Marketing Researchers, Human Resources, Bounty Hunters, Law Enforcement, Red Teams, Blue Teams, Lawyers, and Missing Person Investigations. Key takeaways: Converting data into intelligence, A practical workflow and managing the abundance of data, Using the right tools and techniques to get validated results
Course Author & Instructor
Mishaal Khan is a subject matter expert in cybersecurity, pentesting, Open Source Intelligence and social engineering and a frequent speaker on these topics at Universities and popular cybersecurity conferences like DEFCON, Wild West Hackin’ Fest, and multiple BSides events. Mishaal has worked with multinational companies, securing their networks and providing executive level consultancy as a CISO to manage risk and avoid breaches.
Twitter Handle: @mish3alkhan