Linkedin - Corporate Reconnaissance with Open-Source Intelligence - Examining the First Phase in the Cyber Kill Chain Framework

seeders: 18
leechers: 1
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 48
  • Language: English

Files

[ WebToolTip.com ] Linkedin - Corporate Reconnaissance with Open-Source Intelligence - Examining the First Phase in the Cyber Kill Chain Framework
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 Introduction
    • 01 Keeping your organization safe with open-source intelligence.en.srt (1.2 KB)
    • 01 Keeping your organization safe with open-source intelligence.mp4 (6.6 MB)
    2 Demystifying OSINT and the Cyber Kill Chain
    • 02 Introduction to open-source intelligence (OSINT).en.srt (6.4 KB)
    • 02 Introduction to open-source intelligence (OSINT).mp4 (22.7 MB)
    • 03 The OSINT lifecycle.en.srt (5.1 KB)
    • 03 The OSINT lifecycle.mp4 (7.0 MB)
    • 04 Understanding reconnaissance and OSINT.en.srt (7.3 KB)
    • 04 Understanding reconnaissance and OSINT.mp4 (12.7 MB)
    • 05 Reconnaissance differences and usage Part 1, passive recon.en.srt (8.2 KB)
    • 05 Reconnaissance differences and usage Part 1, passive recon.mp4 (16.1 MB)
    • 06 Reconnaissance differences and usage Part 2, active recon.en.srt (8.0 KB)
    • 06 Reconnaissance differences and usage Part 2, active recon.mp4 (20.7 MB)
    • 07 Understanding the cyber kill chain framework.en.srt (8.2 KB)
    • 07 Understanding the cyber kill chain framework.mp4 (17.8 MB)
    • 08 Fitting OSINT within the cyber kill chain framework.en.srt (6.6 KB)
    • 08 Fitting OSINT within the cyber kill chain framework.mp4 (10.7 MB)
    • 09 Importance of note-taking and reporting (dissemination).en.srt (7.8 KB)
    • 09 Importance of note-taking and reporting (dissemination).mp4 (13.2 MB)
    • 10 Understand operational security (OPSEC).en.srt (7.5 KB)
    • 10 Understand operational security (OPSEC).mp4 (13.9 MB)
    3 OSINT Tools Playground
    • 11 Legal and ethical considerations.en.srt (6.9 KB)
    • 11 Legal and ethical considerations.mp4 (18.1 MB)
    • 12 Setting objectives for OSINT reconnaissance.en.srt (6.2 KB)
    • 12 Setting objectives for OSINT reconnaissance.mp4 (9.2 MB)
    • 13 Introduction to OSINT tools (active vs. passive).en.srt (5.7 KB)
    • 13 Introduction to OSINT tools (active vs. passive).mp4 (10.3 MB)
    • 14 Domain name system (DNS) reconnaissance.en.srt (7.9 KB)
    • 14 Domain name system (DNS) reconnaissance.mp4 (12.6 MB)
    • 15 Search engines reconnaissance.en.srt (7.9 KB)
    • 15 Search engines reconnaissance.mp4 (14.6 MB)
    • 16 Searching for internet-connected devices.en.srt (7.0 KB)
    • 16 Searching for internet-connected devices.mp4 (14.4 MB)
    • 17 Advanced OSINT tools overview.en.srt (8.1 KB)
    • 17 Advanced OSINT tools overview.mp4 (16.2 MB)
    4 Deep and Dark Web OSINT
    • 18 Understanding the surface web vs. deep web vs. dark web.en.srt (8.2 KB)
    • 18 Understanding the surface web vs. deep web vs. dark web.mp4 (11.6 MB)
    • 19 Accessing the dark web safely.en.srt (6.4 KB)
    • 19 Accessing the dark web safely.mp4 (11.5 MB)
    • 20 Discovering tools for dark web reconnaissance.en.srt (4.3 KB)
    • 20 Discovering tools for dark web reconnaissance.mp4 (7.4 MB)
    5 Reporting and Documentation
    • 21 Documenting OSINT findings.en.srt (4.8 KB)
    • 21 Documenting OSINT findings.mp4 (8.1 MB)
    • 22 Documentation toolset.en.srt (6.5 KB)
    • 22 Documentation toolset.mp4 (19.4 MB)
    • 23 Communicating OSINT results.en.srt (5.8 KB)
    • 23 Communicating OSINT results.mp4 (9.7 MB)
    • 24 OSINT reconnaissance report structure example.en.srt (6.3 KB)
    • 24 OSINT reconnaissance report structure example.mp4 (9.0 MB)
    6 Case Study Real-World OSINT Reconnaissance
    • 25 A real-world recon operation Lessons learned and best practices.en.srt (6.8 KB)
    • 25 A real-world recon operation Lessons learned and best practices.mp4 (11.1 MB)
    7 Future Trends for OSINT Reconnaissance
    • 26 Future of OSINT in cybersecurity Challenges and opportunities.en.srt (7.4 KB)
    • 26 Future of OSINT in cybersecurity Challenges and opportunities.mp4 (14.0 MB)
    • Bonus Resources.txt (0.1 KB)

Description

Corporate Reconnaissance with Open-Source Intelligence: Examining the First Phase in the Cyber Kill Chain Framework

https://WebToolTip.com

Released 02/2025
With Tino Šokić
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Skill level: Advanced | Genre: eLearning | Language: English + subtitle | Duration: 1h 58m 21s | Size: 339 MB

Learn how to leverage open-source intelligence (OSINT) reconnaissance techniques to prevent attacks in the first step of the cyber kill chain.

Course details
This course presents a wide range of open-source intelligence (OSINT) reconnaissance techniques that you can use to prevent attacks in the first phase of the cyber kill chain. Join instructor Tino Šokić as he demystifies the essentials of OSINT, the cyber kill chain framework, and operational security for conducting effective OSINT investigations. Discover commonly used OSINT tools, learn how to access the deep and dark web dimension of OSINT, and get tips for documenting your OSINT findings and presenting them to your clients or customers. Along the way, Tino nstrates how a real-world reconnaissance operation actually works, and shares key considerations for the future of OSINT.



Download torrent
338.9 MB
seeders:18
leechers:1
Linkedin - Corporate Reconnaissance with Open-Source Intelligence - Examining the First Phase in the Cyber Kill Chain Framework


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
338.9 MB
seeders:18
leechers:1
Linkedin - Corporate Reconnaissance with Open-Source Intelligence - Examining the First Phase in the Cyber Kill Chain Framework


Torrent hash: E2B6A2C5F0EA6EB624BE38CC499A1A060EC506FB