Module 2 Overview: Theory

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 56 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:01
welcome to the module number two called Theory. I'll just do a quick overview. What are we going to talk about in this module? We'll say what ocean is with an interesting example, Then what are the types of posts and who uses it? And then I will show you how the ocean cycle looks like,
00:18
which is very important as you approach and investigation.
00:22
And in the end, we will talk about the ethics and some moral issues concerning open source intelligence.
00:28
In the next video, we'll try to define what Rosen is, so see you there.
Up Next
Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By