please I have attached 4 document
All discussion from week 1-5 to give an idea to what we discused
Discusion:1
DQ1: How does OSINT contribute to the overall security picture?
DQ2: What is a collection plan? Why would an organization/you need one?
Discussion 2
DQ1: Why is the screening process so integral to the overall interrogation process?
DQ2: How would you adapt this process for cybersecurity work?
Discussion 3
What is a Google dork? What is it used in? Is it helpful for hacking?
Discussion 4
DQ1: You want to use Google dorks to footprint the site but only want results that show file extensions, what Google dork operators would you use, and why?
Discussion 5
What are some common pitfalls of intelligence analysis, and how can you avoid them?
I will also submit some paper from assignment we did through the semester to give an idea. This for assignment 2
Als I will attached my organization