Description
#ethicalhacking #ethicalhackingcourse
Day 37 Osint - Introduction to investigation | Ethical hacking full course with notes
π₯ Hello everyone! Welcome back to our channel, where we go live every night at 10 PM with an ultimate course! Today marks the 6th day, and in the past 5 days, we've covered a plethora of essential topics from basic to advanced levels.
π In this ultimate course, you're in for a special journey where we start with the fundamentals and gradually progress to advanced levels. This 75-day course will provide us with a comprehensive understanding of every topic.
π In this course, you can expect:
Practical demonstrations
Real-world examples
Interactive sessions
Q&A segments
Exciting CTF challenges
Engaging projects
If you have any specific topics you'd like to discuss or any queries, feel free to ask in the comment section.
Additionally, we'll be incorporating notes, CTF (Capture The Flag) challenges, and exciting projects into our sessions to enhance your learning experience further.
It's important for us to adhere to our community guidelines. Here, we prioritize respect and positive interaction. Therefore, please treat all users with respect.
If you haven't subscribed yet, be sure to do so now to receive our latest updates and notifications firsthand.
Thank you, and see you in tonight's live session at 10 PM!
Timestamps:
00:00:00 Introduction
00:03:20 What is OSINT ?
00:07:15 Data vs Information vs Knowledge
00:12:30 OSINT Types
00:17:12 Surface web vs Deep web vs Dark web
00:27:02 Step for OSINT
00:31:00 Mindmap for OSINT
00:42:30 Search Engines for OSINT
00:43:30 Google Dorking
00:51:00 Password Hunting
00:53:00 Google Hacking Database
00:55:00 Find Vulnerable systems with shodan
00:58:30 Wayback Machine
01:00:00 QNA
π΄ Disclaimer π΄
This video is made available for educational and informational purposes only. We believe that everyone must be aware of ethical hacking and cybersecurity to avoid different types of cyberattacks on computers, websites, apps, etc. Please regard the word hacking as ethical hacking every time we use it.
All our videos have been made using our own systems, servers, routers, and websites. It does not contain any illegal activities. Our sole purpose is to raise awareness related to cybersecurity and help our viewers learn ways to defend themselves from any hacking activities. WsCube Tech is not responsible for any misuse of the provided information.
β CONNECT WITH THE FOUNDER ( Mr.Trishant chaudhary)
π Instagram - https://www.instagram.com/trishantrajora2.0?igsh=MWVvYzg1aTMyZmp1aQ==
π LinkedIn -https://www.linkedin.com/in/trishant-rajora-b7478a204/
π Facebook - https://www.facebook.com/people/Trishant-Rajora/100064086395752/
Connect with cybersecurityghost on social media for the latest offers, promos, and much more:
π Instagram-https://www.instagram.com/cybersecurityghost?igsh=MWY4NXhxNWZyaXAwcA==
π Facebook: https://www.facebook.com/people/Cybersecurityghost/100095229106365/?mibextid=b06tZ0
π±Telegram- https://t.me/CyberSecurityGhost
π Discord -https://discord.gg/GVW8bTdzWB
@TCMSecurityAcademy
@WsCubeCyberSecurity
#cybersecurity #ethicalhacking #ethicalhackingcourse











