OSINT Deep Dive
RCCE students will learn open source intelligence collection, analysis, and operational security including social media intelligence, domain and infrastructure reconnaissance, dark web monitoring, and OSINT tool proficiency. RCCE students will learn to conduct OSINT investigations using publicly available data sources, perform people searches and social media analysis, enumerate organizational infrastructure through DNS, WHOIS, and certificate transparency logs, monitor paste sites and dark web forums for leaked credentials and threat actor activity, apply OSINT tradecraft while maintaining operational security, and produce actionable OSINT reports. This deep-dive course provides comprehensive technical coverage that goes beyond surface-level understanding. At an expert level, RCCE students will learn to master the nuances, edge cases, and advanced configurations that separate competent practitioners from true experts. Students will engage with complex real-world scenarios and gain the depth of knowledge required to troubleshoot difficult situations, mentor junior team members, and make architectural decisions with confidence.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing OSINT Deep Dive
- Execute hands-on tasks for osint deep dive
- Execute hands-on tasks for open source intelligence collection, analysis & operational security
- Execute hands-on tasks for threat intelligence
- Explain Executive Overview fundamentals — covering Intelligence from publicly available.
- Execute hands-on tasks for what is osint? — covering Intelligence from publicly available.
- Execute hands-on tasks for course scope — covering 18 subtopics across 7 sessions.
- Execute hands-on tasks for why it matters — covering 80% of breaches involve recon phase.
- Execute hands-on tasks for proactive defense
- Build detections and response workflows for privilege escalation
- Measure attack surface reduction and program effectiveness — covering Identify threats before, Accelerate attribution, Quantify organizational.
- Execute hands-on tasks for validate threat actor ttps — covering Quantify organizational.
- Execute hands-on tasks for core definitions & taxonomy
| Module 01 | OSINT Deep Dive |
| Module 02 | Open Source Intelligence Collection, Analysis & Operational Security |
| Module 03 | Threat Intelligence |
| Module 04 | Executive Overview |
| Module 05 | What is OSINT? |
| Module 06 | Course Scope |
| Module 07 | Why It Matters |
| Module 08 | Proactive Defense |
| Module 09 | Incident Response |
| Module 10 | Risk Reduction |
| Module 11 | Validate threat actor TTPs |
| Module 12 | Core Definitions & Taxonomy |
| Module 13 | OPSEC Principles |
| Module 14 | Common OPSEC Failures |
All hands-on labs run on Rocheston Rose X OS. Students practice osint deep dive by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for osint deep dive
- Lab 2: Execute hands-on tasks for open source intelligence collection, analysis & operational security
- Lab 3: Execute hands-on tasks for threat intelligence
- Lab 4: Explain Executive Overview fundamentals
- Lab 5: Execute hands-on tasks for what is osint?
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for OSINT Deep Dive, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI