{"id":22730,"date":"2026-05-07T15:34:45","date_gmt":"2026-05-07T15:34:45","guid":{"rendered":"https:\/\/sigmaxhub.com\/?post_type=lp_course&#038;p=22730"},"modified":"2026-05-07T15:34:45","modified_gmt":"2026-05-07T15:34:45","slug":"open-source-intelligence-osint","status":"publish","type":"lp_course","link":"https:\/\/sigmaxhub.com\/ar\/courses\/open-source-intelligence-osint\/","title":{"rendered":"Open Source Intelligence (OSINT)"},"content":{"rendered":"<h2>Course Overview<\/h2>\n<p>This practical training course teaches students professional Open Source Intelligence (OSINT) techniques for collecting, analyzing, and investigating publicly available information.<\/p>\n<h2>\u0645\u0627 \u0633\u062a\u062a\u0639\u0644\u0645\u0647<\/h2>\n<ul>\n<li>Introduction to OSINT<\/li>\n<li>Social Media Intelligence<\/li>\n<li>Email &amp; Username Investigation<\/li>\n<li>Website Footprinting<\/li>\n<li>Google Dorking Techniques<\/li>\n<li>Digital Footprint Analysis<\/li>\n<li>OSINT Tools &amp; Platforms<\/li>\n<li>Practical Investigation Scenarios<\/li>\n<\/ul>\n<h2>Who Should Enroll<\/h2>\n<ul>\n<li>Cybersecurity Students<\/li>\n<li>Investigators<\/li>\n<li>SOC Analysts<\/li>\n<li>Threat Intelligence Enthusiasts<\/li>\n<\/ul>\n<h2>Course Features<\/h2>\n<ul>\n<li>Practical Investigation Labs<\/li>\n<li>Real OSINT Scenarios<\/li>\n<li>Hands-on Tools<\/li>\n<li>\u0634\u0647\u0627\u062f\u0629 \u0634\u0645\u0644\u062a<\/li>\n<\/ul>\n<h2>Career Opportunities<\/h2>\n<ul>\n<li>Threat Intelligence Analyst<\/li>\n<li>OSINT Researcher<\/li>\n<li>Cybersecurity Investigator<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Professional OSINT course covering Social Media Intelligence, Digital Investigations, and practical intelligence gathering techniques.<\/p>","protected":false},"author":1,"featured_media":22731,"comment_status":"open","ping_status":"closed","template":"","course_category":[48],"course_tag":[136,133,132,135,134],"class_list":["post-22730","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-cybersecurity","course_tag-digital-investigation","course_tag-open-source-intelligence","course_tag-osint","course_tag-social-media-intelligence","course_tag-threat-intelligence","course"],"_links":{"self":[{"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/lp_course\/22730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/comments?post=22730"}],"version-history":[{"count":1,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/lp_course\/22730\/revisions"}],"predecessor-version":[{"id":22732,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/lp_course\/22730\/revisions\/22732"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/media\/22731"}],"wp:attachment":[{"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/media?parent=22730"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/course_category?post=22730"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/sigmaxhub.com\/ar\/wp-json\/wp\/v2\/course_tag?post=22730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}