Types of OSINT

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
1 hour 56 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:00
Welcome back In the last video, we learned about what ocean is, and in this video we will talk and learn about the ocean types.
00:11
When we talk about types of hasn't from a security perspective, it could be divided into two things. Offensive and defensive absent, the good guys and the bad guys
00:21
inoffensive. Absent, the bad guys gather and learn about their target before the attack.
00:27
The defensive off wasn't gives an insight what influence potential attacks could happen, so you could make an informed decision based on that info.
00:35
Remember what chosen means
00:38
information that will allow you to make an informed decision. Both of these ocean types give opportunities to both the defender and the attacker. Also for both asides, preparation is paramount.
00:50
For example, you have a company, and you can learn about weaknesses off your company and actually fix them.
00:56
But at the same time, bad guys could also learn about them. And that is one of the main reasons why good security practices. And I would say, overall, I t. Posture quality is very important for an organization or a company,
01:11
since we're talking about the company also have to mention that many companies might think of their documents, which are shared online. Toby Rather okay,
01:21
and we call those documents the great literature
01:23
because it includes written information not intended for public use.
01:29
Sharing can easily result in the documents ending up where easily founded by Internet searches or searches through the trash. I recommend for you to check out Dumpster diving.
01:40
Great literature includes technical reports, working papers, offers, invoices, unpublished works, newsletters, business proposals, requests for proposals and so on. Olsen is also used to determine which organizations to attack which organizations have something off. High value
02:00
is the cost of stealing those high value items worth the return.
02:04
What is the best attack vector for specific organization who are the best targets for a phishing attack or other types of social engineering? In this video we went through, What are the chosen types? And in the next month we will go over who uses Ossan. So see you there
Up Next
Open Source Intelligence (OSINT) Fundamentals

In this Open Source Intelligence (OSINT) Fundamentals training course, you will gain fundamental knowledge about OSINT, who uses it, and the ethical implications of using it. Upon completion, students will have a solid understanding of OSINT.

Instructed By