
This course progresses from basic to very advanced practical OSINT techniques that you can use in your investigative routine. No special software, operating system, or paid licenses are required.
Course Length: 16 Hours
Includes a Certificate of Completion
Next scheduled date: WWHF Deadwood 2025 - Link at bottom.
Description
This course progresses from basic to very advanced practical OSINT techniques that you can use in your investigative routine. No special software, operating system, or paid licenses are required.
Whether you’re performing background checks, researching partners or competitors, hunting missing persons or criminals, getting leverage on lawsuits, or becoming a better ethical hacker, this course takes you through advanced online investigative techniques to boost your efforts. It also provides examples of offline search techniques and how to think outside the box. Every technique is explained extensively with live examples. There are plenty of smart hacks and techniques you can utilize to get some unexpected and useful information.
Bookmarks for all tools and websites used will be provided for quick access.
Topics Covered Include:
- Investigate using seed information like usernames, phone numbers, names, or emails
- Learn to pivot to new information
- Utilize different search engines for varying results
- Validate using government records
- Use automation for quicker searches across a broader spectrum
- Search through breached data
- Identify hidden accounts using correlation
- Create a mind map of data
- Create and maintain sock puppet accounts
- Compile a report
FAQ
A practical workflow and managing the abundance of data
Using the right tools and techniques to get validated results
About the Instructor

Mishaal Khan
"I specialize in OSINT, Privacy, and Cybersecurity."Bio
Mishaal is a highly respected figure in cybersecurity, with expertise in ethical hacking, Open Source Intelligence (OSINT), social engineering, and privacy. Mishaal’s engaging approach involves live demos, making cybersecurity accessible and enjoyable, while his strength lies in rapidly enhancing organizations’ security posture, saving time and budget.
This class is being taught at Wild West Hackin’ Fest – Deadwood 2025.
For more information about our conferences, visit Wild West Hackin’ Fest!
Clicking on the button above will take you to our registration page
Related products
-
Multiple InstructorsLive
Workshop: Intro to Virtualization with Daniel Lowrie
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Build a Multi-Modal C2 Covert Channel in Golang with Faan Rossouw
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLiveOD
OWASP Top 10 with Jim Manico
View Course This product has multiple variants. The options may be chosen on the product page -
Multiple InstructorsLive
Workshop: Telemetry to Tactics: A Hands-On Detection Engineering Workshop with Hal Denton
View Course This product has multiple variants. The options may be chosen on the product page