Domain / IP IV

You cannot view this unit until you login.

Video Training Login

Video Resources

You must be logged in to load the following pages. If you are looking for the LIVE CLASS resources, they are HERE .


Course Progress


Latest Videos


Priority Support


Software Downloads


Advanced Resources


API Resources


Renew Your Membership

OSINT Course

1 Introduction | 2 HR+
1 OSINT Introduction
2 Covert Account Creation
3 Covert Account Update
4 Covert Account Activity
5 VPN Usage
6 Private Browsers
7 Covert Facebook Update
2 Search Engines | 5 HR+
1 Search Introduction
2 Search Operators
3 Google Options
4 Bing Options
5 Alternative Engines
6 Alternative Engines II
7 International Search
8 Newsgroups
9 Online News
10 Newspaper Archive
11 FTP Search
12 Search Alerts
13 Google Update
14 Custom Engines
15 Google Date
16 Dark Web
17 Dark Web II
18 Wayback Search
3 Social Networks | 6 HR+
1 Introduction
2 Facebook 01
3 Facebook 02
4 Facebook 03
5 Facebook 04
6 Facebook 05
7 Facebook 06
8 Facebook 07
9 Facebook 08
10 Facebook 09
11 Facebook 10
12 Facebook 11
13 Twitter 01
14 Twitter 02
15 Twitter 03
16 Twitter 04
17 Instagram
18 Google Plus
19 Smaller Networks
20 SN Update
4 Mapping | 2 HR+
1 Google Maps
2 Bing Maps
3 Maps Tools
4 Mapping Update I
5 Mapping Update II
5 Photographs | 2 HR+
1 Photos Search
2 Reverse Search I
3 Reverse Search II
4 Twitter Images
5 Photo Metadata
6 Photo Manipulation
6 Deleted Data | 1 HR+
1 Cached Data
2 Website Archives I
3 Website Archives II
7 People Search | 3 HR+
1 People Search I
2 People Search II
3 Voter Records
4 White Pages
5 Government Records
6 International Search
7 Gift Registries
8 Source Code
8 Social Traffic | 1 HR+
1 Social Traffic
9 Documents | 2 HR+
1 Shared Documents
2 Document Search I
3 Document Search II
4 Leaked Documents
5 Document Search Tool
6 Google Calendars
10 Businesses | 1 HR+
1 LinkedIn
2 LinkedIn Email Search
3 Resumes
4 Bitcoin
11 Online Communities | 3 HR+
1 eBay
2 Craigslist
3 Classifieds
4 School Alumni
5 Dating Sites
6 Tinder I
7 Tinder II
8 Reddit I
9 Reddit II
10 Criminal Markets I
11 Criminal Markets II
12 Darknet Investigations
12 Email & User Names | 2 HR+
1 Email Search
2 Email Search II
3 User Names I
4 User Names II
5 Email/User Leaks
6 Email/User Leaks II
7 Email/User Leaks III
13 Telephone Numbers | 2 HR+
1 Telephone Search I
2 Telephone Search II
3 Telephone Search III
4 Telephone Search IV
5 NextCaller
6 Caller ID Test
14 Crime Data | 1 HR+
1 Crime Data
15 Videos | 2 HR+
1 Videos Search
2 YouTube I
3 YouTube II
4 Reverse Video Search
16 Domains/IP Addresses | 2 HR-
1 Domains
2 IP Addresses
3 Shodan & Wigle
4 Domain / IP II
5 Domain / IP III
6 Domain / IP IV
7 URL Shorteners
17 Miscellaneous Data | 1 HR+
1 Forums
2 Vital Records
3 Professional Records
4 Vehicle Records
18 APIs | 2 HR+
1 API Introduction
2 Pipl API
3 Full Contact
4 Caller ID I
5 Caller ID II
6 Flickr API
19 Applications | 10 HR+
1 Windows Introduction
2 Firefox I
3 Firefox II
4 Firefox III
5 Firefox IV
6 Chrome
7 Browser Scripts
8 Firefox Containers
9 Tor Browser
10 Screen Capture
11 HTTrack
12 Video Extract
13 Video Player
14 Video Converter
15 Video Eliminator
16 Audio Extract
17 Video Metadata
18 Google Earth
19 Exif Tool
20 Document Metadata
21 FOCA
22 Metagoofil
23 User Lookup
24 Email Harvester
25 Knock Pages
26 SubBrute
27 DirBuster
28 IP/Domain Info
29 Twitter Export
30 SearchDiggity
31 OS Forensics
32 Recuva
33 Creepy
34 InstagramDL
35 Photo Mapper
36 ExtractFace
37 ForeVid
38 Periscope Downloader
39 Web Snapper
40 Video Downloader
41 CCleaner/BleachBit
20 Mac Applications | 2 HR+
1 Mac Introduction
2 Mac Web Browser
3 Video Downloader
4 Video Utilities
5 Instagram Download
6 Screen Capture
21 Operating Systems | 3 HR+
1 USB Boot Options
2 Virtual Machines
3 Custom Linux OS
4 Custom Linux USB
5 Windows Virtual Machine
22 Buscador Linux VM | 5 HR+
1 Buscador Introduction
2 Buscador Browsers
3 Buscador Apps
4 Buscador Recon-ng
5 Buscador Update
6 Buscador Security
7 Buscador 1.2
23 Android Emulation | 3 HR+
1 Android Emulation I
2 Android Emulation II
3 Android Emulation III
4 Android Emulation IV
5 Android Emulation V
24 Investigation Methods | 3 HR+
1 Caller ID Spoofing
2 Google Voice
3 Email Forwarding I
4 Email Forwarding II
5 IP Logger I
6 IP Logger II
7 IP Logger III
8 IP Logger IV
9 Frequency Monitoring
10 Stolen Goods
11 Email Assumptions
12 Avoiding Analytics
13 OSINT Flowcharts
25 Documentation | 1 HR+
1 Documentation Techniques
2 Download Tools
3 Event Monitoring
4 Hunchly
26 OSINT Search Tool | 1 HR+
1 OSINT Search Tool
27 Data Sets | 1 Hour+
1 LinkedIn Data
2 Consumer Data
3 SpecialK Spam Data
4 Usenet Archive I
5 Usenet Archive II
28 Certificate+
1 Certificate

Privacy Course

1 Privacy Introduction | 1 HR+
1 Privacy Introduction
2 Computer Security | 4 HR+
1 Windows vs Mac
2 Windows: AntiVirus
3 Windows: AntiMalware
4 Windows: Cleaners
5 Windows: CCEnhancer
6 Windows: System Settings
7 Windows: OOSU 10
8 Mac: AntiVirus
9 Mac: AntiMalware
10 Mac: Cleaners
11 Mac: Onyx
12 Mac: Little Snitch
13 Mac: Objective-See
14 Mac: System Settings
3 Web Browser Security | 4 HR+
1 Browser Introduction
2 Chrome
3 Firefox
4 Microsoft
5 Safari
6 Epic
7 Min
8 Tor Browser
9 Incognito
10 Script Blocking
11 uBlock Origin
12 Browser Containers
13 Browser Agents
4 VPNs | 1 HR+
1 Virtual Private Networks
5 Preparation | 2 HR+
1 Preparation Introduction
2 Email: GMX
3 Email: 33Mail
4 Google Voice
5 Online Fax
6 Mail Control
6 Self Pre-Assessment | 1 HR+
1 Self Pre-Assessment
7 Self-Background | 1 HR+
1 Self Background Check
8 Online Accounts | 3 HR+
1 Password Policies
2 Password Manager: Local
3 Password Manager: Web
4 Two Factor Authentication
5 Authy
6 Yubikey Static
7 Keepass & Yubikey
8 KeePassXC Browser
9 Data Removal | 3 HR+
1 Personal Data Removal I
2 Personal Data Removal II
3 Personal Data Removal III
4 Personal Data Removal IV
5 Personal Data Removal V
6 Personal Data Removal VI
7 Personal Data Removal VII
10 Credit Companies | 1 HR+
1 Credit Reports
2 Credit Freeze
11 Purchases | 1 HR+
1 Purchases Introduction
2 Blur Masked Cards
3 Privacy Masked Cards
12 Telephones | 1 HR+
1 Hardware
2 Service
3 VOIP-Android
4 VOIP iOS
13 Communications | 1 HR+
1 Email
2 Messaging
3 Telephone
4 Checksums
14 Smartphone Security | 1 HR+
1 Smartphone Introduction
2 Smartphone Android
3 Smartphone iOS
15 Data-at-Rest | 1 HR+
1 Full Disk Encryption
2 File Container Encryption
16 Virtual Machines | 1 HR+
1 Stateless Machines
2 Persistent Machines
17 Aliases | 1HR+
1 Aliases
18 Disinformation | 1 HR+
1 Disinformation I
2 Disinformation II
19 Future Monitoring | 1 HR+
1 Future Monitoring
2 Canary Tokens
20 Government Records | 1 HR+
1 Government Records
21 Privacy Conclusion+
1 Privacy Conclusion
22 Certificate+
1 Certificate

Cyber Course

1 Cyber Introduction+
1 Cyber Introduction
2 Cyber Phishing+
1 Cyber Phishing
3 Password Attacks+
1 Password Attacks
4 Social Network Attacks+
1 Social Network Attacks
5 Telephone Attacks+
1 Telephone Attacks
6 Internet of Things+
1 Internet of Things
7 Wireless Attacks+
1 Wireless Attacks
8 Cyber Summary+
1 Cyber Summary