Time
1 hour 56 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:00
Welcome back in the last video we learned about what goes in is, and in this video we will talk and learn about the O. Since types,
00:11
when we talk about types of frozen from a security perspective, it could be divided into two things offensive and defensive. Oh, sent the good guys and the bad guys
00:21
inoffensive. Oh, since the bad guys gather and learn about their target before the attack,
00:27
the defensive off oh sent gives an insight. What informed potential attacks could happen so you could make an informed decision based on that info.
00:35
Remember what oh sent means
00:38
information that will allow you to make an informed decision. Both of this ocean types give opportunities to both the defender and the attacker. Also for both asides, preparation is paramount.
00:50
For example, you have a company, and you can learn about weaknesses of your company and actually fix them.
00:56
But at the same time, bad guys could also learn about them. And that is one of the main reasons why good security practices. And I would say, overall, I t. Posture quality is very important for an organization or a company.
01:11
Since we're talking about a company I also have to mention that many companies might think of their documents, which are shared online. Toby Rather OK,
01:21
and we call those documents the Grey literature
01:23
because it includes written information not intended for public use.
01:29
Sharing can easily result in the documents ending up where easily founded by Internet searches or searches through the trash. I recommend for you to check out Dumpster diving.
01:40
Great literature includes technical reports of working papers, offers, invoices, unpublished works, news, laters, business proposals, requests for proposals and so on. All sent is also used to determine which organizations to attack, which organizations have something of higher value
02:00
is the cost of stealing those high value items worth the return.
02:04
What is the best attack factor for a specific organization for the best targets for efficient attack or other types of social engineering? In this video we went through, what are the ocean types? And in the next Mom, we will go over who uses so sent, So see you there

Up Next

Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By

Instructor Profile Image
Tino Sokic
CEO at DobarDan
Instructor