Books & Videos

Table of Contents

  1. Chapter 1 Foundation: Understanding the Basics

    1. Introduction

    2. Internet

    3. World Wide Web

    4. Defining the basic terms

    5. Web browsing—behind the scene

    6. Lab environment

  2. Chapter 2 Open Source Intelligence and Advanced Social Media Search

    1. Introduction

    2. Open source intelligence

    3. How we commonly access OSINT

    4. Web 2.0

    5. Social media intelligence

    6. Social network

    7. Advanced search techniques for some specific social media

    8. Web 3.0

  3. Chapter 3 Understanding Browsers and Beyond

    1. Introduction

    2. Browser operations

    3. History of browsers

    4. Browser architecture

    5. Browser features

    6. Raw browsers

    7. Some of the well-known custom browsers

    8. Addons

    9. Bookmark

    10. Threats posed by browsers

  4. Chapter 4 Search the Web—Beyond Convention

    1. Introduction

  5. Chapter 5 Advanced Web Searching

    1. Introduction

    2. Google

    3. Bing

    4. Yahoo

    5. Yandex

  6. Chapter 6 OSINT Tools and Techniques

    1. Introduction

    2. Creepy

    3. TheHarvester

    4. Shodan

    5. Search Diggity

    6. Recon-ng

    7. Yahoo Pipes

    8. Maltego

  7. Chapter 7 Metadata

    1. Introduction

    2. Metadata extraction tools

    3. Impact

    4. Metadata removal/DLP tools

  8. Chapter 8 Online Anonymity

    1. Anonymity

    2. Online anonymity

    3. Why do we need to be anonymous

    4. Ways to be anonymous

  9. Chapter 9 Deepweb: Exploring the Darkest Corners of the Internet

    1. Introduction

    2. Why to use it?

    3. Why not to use it?

    4. Darknet services

    5. Disclaimer

  10. Chapter 10 Data Management and Visualization

    1. Introduction

    2. Data management and analysis tools

  11. Chapter 11 Online Security

    1. Introduction

    2. Malwares

    3. Phishing

    4. Online scams and frauds

    5. Hacking attempts

    6. Weak password

    7. Shoulder surfing

    8. Social engineering

    9. Antivirus

    10. Identify phishing/scams

    11. Update operating system and other applications

    12. Addons for security

    13. Tools for security

    14. Password policy

    15. Precautions against social engineering

    16. Data encryption

  12. Chapter 12 Basics of Social Networks Analysis

    1. Introduction

    2. Gephi

    3. Node attributes

    4. Edge attributes

  13. Chapter 13 Quick and Dirty Python

    1. Introduction

  14. Chapter 14 Case Studies and Examples

    1. Introduction

    2. Case studies

  15. Chapter 15 Related Topics of Interest

    1. Introduction

    2. Cryptography

    3. Data recovery/shredding

    4. Internet Relay Chat

    5. Bitcoin