Course curriculum

  1. 1
  2. 2
    • OSINT Framework

    • OSINT Framework Overview

  3. 3
    • Shodan.io

    • Shodan.io Overview

  4. 4
    • Censys Overview

    • Censys.io Overview

  5. 5
    • Exploit Database

    • Exercise: Search Exploit-DB

    • Google Hacking

    • Exercise: Search Google Hacking Database

Perks From The Course

  • OSINT Framework

    Learn how to map your plan towards obtaining open source intelligence for your offensive security engagement or research project.

  • Shodan.io

    Gain insight on how to leverage Shodan.io for information gathering and potentially finding paths of exploitation.

  • Censys.io

    Understand on how to search the database for hundreds of thousands of records regarding webcams, routers and various sorts of IOTs. Learn on how to leverage for penetration testing.