Загрузка страницы

Leveraging Telegram for OSINT purposes | SANS@MIC Talk

This talk is all about Telegram and how the social media app can be used to gather Open Source Intelligence (OSINT). It will show what Telegram is about, how to spot the difference between bots, groups and users. The talk will also cover how to find telegram groups on the clear-web. Attendees will get useful and practical tips on how to scrape and extract data from telegram users and groups.

Speaker Bio

Nico Dekens is an all round all source analyst with years of government experience. He has taught hundreds police, tax & military units to conduct OSINT research & analysis. Nico is also a known keynote speaker who has given lectures about OSINT & Cyber Intelligence at governments in Europe & the USA.

Some people may know Nico by his online handle Dutch_Osintguy where he shares OSINT techniques, knowledge and tips. Nico also writes a OSINT related blog at Medium with his handle Dutch_Osintguy. The energy he gets by teaching others all there is to know about conducting Open Source Intelligence Research and Investigations is what drives Nico to stay on top of his game. Sharing knowledge is key is Nico's motto.

About SANS

SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.

Видео Leveraging Telegram for OSINT purposes | SANS@MIC Talk канала SANS Institute
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
18 августа 2020 г. 18:39:56
01:02:26
Яндекс.Метрика