Skip to content

Introduction

In this section, we are going to learn about collecting, analyzing, and interpreting information from digital and open sources, and how to apply methodologies and best practices to achieve this goal.


Structure

This section is divided into four main areas:

  1. Fundamentals: Learn about the intelligence cycle, threat actors, indicators of compromise (IOCs), and how to turn raw data into actionable intelligence.
    Go to Fundamentals →

  2. OSINT: Explore techniques and tools for collecting information from publicly available sources, while respecting legal and ethical boundaries.
    Go to OSINT →

  3. SOCMINT: Discover how to analyze social media data and metadata to gain insights about targets, campaigns, or emerging threats.
    Go to SOCMINT →

  4. Dark Web: Understand the types of dark web sites, the risks involved, and the tools used for safe exploration and intelligence gathering.
    Go to Dark Web →


How to use

  • Start with Threat Intelligence to understand the fundamentals of cyber intelligence.
  • Use OSINT and SOCMINT for practical data gathering exercises.
  • Explore the Dark Web topics with caution, always following ethical and legal guidelines.
  • Each subsection contains practical examples, tools, and notes for real-world application.