Getting to know each social network
Learn unique method to each to create accounts
Learn how to access each network
Learn about different methods for access
Creating accounts independently using +86
Creating authentic sock puppets in China
Configuring Profile Data (name, photo, details)
Examples
Strategy
In this module we will teach you unique OSINT methods, tips, tactics and strategies of information collection per each domestic network.
Reverse Searching, Manual API Manipulation, Hacks and Tricks you can't find in the West.
With this training you will leave knowing much more than you did prior to taking this course.
You will be able to conduct OSINT investigations, use tools, resources that most Westerners do not get access to.
And.. most importantly gain the skill to find NEW tools and resources for SOCMINT, all by yourself.
With this training you can be confident that you will learn more than the average Western OSINT investigator, even one that already has some experience in China OSINT.
Because our methods are uniquely developed to be exclusive to EPCYBER.
And we bring to you information that is from the deepest domestic corners of the Chinese internet.
In this unique course we do not only focus on domestic social networks in China, but we provide you more than that.
You will gain a deep understanding of breaking down all linguistic barriers in China
From searching the right keywords, understanding Context, understanding what you search, and how to find exactly what you need on these networks.
Manipulate API calls to extract data in reverse search? That and other manual methods to find data you're technically not supposed to. ;-)
Creating avatars is important for your passive search and presence on these domestic networks, maintaining one also, so that's what you will learn.
Reverse Searches, Search Engines, Tools, Portals, Instances, Interfaces, Closed and Open ones.. all at your fingertips for OSINT purposes.
Understanding context is one of the 4 most important skills for a China SOCMINT professional. We show you the depth of context, different methods, tips to understanding it fully.
Find domestic only (hidden from Western eyes) developments, methods, tactics to work around WeChat and not have any barriers on this app.
Find hacker groups, guides, blogs, all for Cyber Threat Intelligence too, monitoring cyber crime from China's internet.
Just like in the West, we use socials to do OSINT on companies, people, etc.. China is no exception. We show you various guided case studies with examples, screenshots and tips on different real life case scenarios you can do inside China's domestic networks.
You get:
Our team supports you throughout your entire access journey.
We answer all questions via email and encourage active communication.
With this you are not going to be worried about feeling 'limited' in places where OSINT doesn't get the job done.
You'll learn to think creatively, use methods most OSINT analysts don't practice.
Review from one of our students,Japan
Your course is very insightful and useful, content is great!.
Really happy I took your training, the QQ method you provided actually worked! Thank you.
Extremely thorough content, unlike anything we've encountered before.
This is really great, I am enjoying the content and the course a lot, thank you very much!
By completing the purchase, you agree to terms and conditions below.
1. I CONFIRM THAT I HAVE READ THE ONLINE COURSES TERMS AND CONDITIONS CAREFULLY AND FULLY UNDERSTAND ITS CONTENTS AND ACCEPT IT OF MY OWN FREE WILL.
2. I HEREBY EXPRESSLY RECOGNIZE THAT BY ENROLLING IN THIS ONLINE COURSE I ACCEPT THAT THIS IS A CONTRACT PURSUANT TO WHICH I HAVE RELEASED ALL CLAIMS AGAINST FALCON, PROFESSIONAL SECURITY AND TRAINING LLC and EPCYBER.
3. BY SUBMITTING THIS ENROLLMENT FORM I UNANIMOUSLY AGREE TO THESE TERMS AND CONDITIONS.
Please reach us at team@epcyber.com if you cannot find an answer to your question.
If you want to SOCMINT like a pro in China's social media, without feeling the struggle of 'linguistics', and to truly break all barriers that most Western investigators face, when trying to do any research in China. Then this is for you, we cover everything for SOCMINT and beyond.
Yes, you will get the latest methods, resources, and tactics upon purchase.
We confirm your payment via email and send the materials in portions to confirm accuracy of email address. Once confirmed, we send the rest.
Access lasts for 50 days.
Yes, you can purchase an extension up to one (1) times, for an additional 10, 20 or 30 days.
Complete the purchase(s) and email the employee(s) details to team@epcyber.com for delivery.
You can focus on specialized trainings like QQ, WECHAT, SOCMINT that are shown on our home page.
No downloads, forwarding, sending, printing, or sharing allowed. Viewing only.
Copyright © 2022 EPCYBER INTELLIGENCE - All Rights Reserved.
team@epcyber.com | For questions about all offerings, content, courses, trainings, pricing, consultations, other questions.
cyber-academy@falcon-security.us| For technical questions about payment links, payment methods only.
Washington DC Metro Area
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.