- Course
The OSINT Framework
This course teaches you how to protect your identity, collect and validate data across the web, analyze infrastructure and imagery, assess breach exposure, and document findings professionally.
- Course
The OSINT Framework
This course teaches you how to protect your identity, collect and validate data across the web, analyze infrastructure and imagery, assess breach exposure, and document findings professionally.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Publicly available data contains valuable intelligence, but without structure and operational security, investigations can expose the analyst and produce unreliable conclusions. Many open-source investigations begin with simple searches and scattered findings, but they lack a disciplined workflow and defensible documentation. In this course, The OSINT Framework, you'll gain the ability to conduct structured, secure, and reproducible open-source investigations. First, you’ll explore how to establish operational security controls by isolating investigative environments, separating identities, and managing network routing. Next, you’ll discover how to collect and correlate intelligence across search engines, social platforms, infrastructure records, imagery, and breach databases using publicly accessible tools. Finally, you’ll learn how to visualize relationships, preserve evidence, and document findings in a way that supports professional reporting and validation. When you’re finished with this course, you’ll have the skills and knowledge of a complete OSINT workflow needed to conduct safe, validated, and report-ready intelligence investigations.