top of page

Acerca de


Course info

The course’s main target is to provide graduates with the skills, knowledge and mindset involved in the process of Open Source Intelligence gathering. The collection and application of OSINT is a mission critical aspect to support operational resources across multiple sectors from Law Enforcement, Military, Close Protection, recruitment, investigative journalism, Corporate development, PI/Surveillance, business analytics and much more.

The CIA ‘Bin Laden’ unit claimed that 90% of what they needed to locate and capture their target was Open Source Intelligence, while in 2005 W.M Nolte (Former deputy assistant director of the CIA) claimed that 95-98% of all information provided by the US intelligence services was OSINT based.


This course will be taught using theoretical and practical exercises. The lectures will be conducted in the classroom including a number of case studies followed with exams based on real world investigations as well as report assignements.

Skill prerequisits

The course is designed to be completly beginner friendly and no prior I.T./Computer knowledge is required although students are expected to have proficent English in order to follow and understand the lessons.

Required gear

Each student must bring their own Laptop that supports virtulization and have at least 8gb of RAM along with 100GB of free space.
If you are unsure if your device supports virtulization then please refer to the user manual or google to confirm.


  • What is OSINT?

  • Practical application of OSINT

  • The Intelligence Cycle

  • Setting up a virtual OSINT LAB

  • Preparing your Machine

  • OPSEC – VPN, TOR, Privacy Extensions

  • Defining the scope of an Investigation

  • Evidence Documentation

  • Domains and Corporate Intelligence

  • Persons Of Interest

  • Email Addresses

  • Data Breaches

  • Phone Numbers

  • GEOINT – Geospatial Intelligence

  • Metadata

  • Imagery Analysis

  • Video Analysis

  • Cryptography

  • SOCMINT – Social Media Intelligence gathering

  • Cryptocurrencies

  • DarkWeb Investigations

  • Digital Footprint Visual Mapping

  • Finalising an Investigative report

  • CTF EXAM and Assignments

bottom of page