Live Training Sessions

We offer two unique live courses that are presented by various instructors, all of which were personally trained by Michael Bazzell. The Open Source Intelligence Techniques (OSINT) training is a 3-day class which presents all of the latest advanced methods of locating online information. The Complete Privacy & Security Crash Course is a 2-day class focused on protecting your digital information and reclaiming your right to true privacy. Details of both are available in the links below.

Live OSINT Training Sessions

During our 3-day Open Source Intelligence course, We demonstrate new investigation techniques that are vital to any Investigator's arsenal of tools. This is a very full three days of instruction intended on teaching a unique response to online investigation with unconventional free resources. Participants receive access to the entire Investigations Resources area of the site which includes the following:

A complete updated list of all OSINT resources
20 custom Web tools that locate "hidden" info on all popular social networks
A custom online search tool that automates many search processes
A custom Linux OSINT Virtual Machine ready for immediate use
A pre-configured portable browser with investigation extensions
Updated online materials for all training sessions

Contact us to book this training!

Day One:

Open Source Intelligence Techniques Part I

This session identifies and demonstrates numerous free online resources that can aid internet researchers in solving both technical and non-technical investigations. Participants will be shown how to "dig" into the internet for personal information about any target. While popular sites such as Twitter, Instagram, and Facebook are covered in detail (including techniques that legally access some "hidden" content), the presentation goes much deeper into the vast resources available online for researching personal information. Additionally, instructions for identifying local events in real time will be presented in great detail. This first day focuses on the most popular social networks and proper retrieval of located information. These sources can also be used to conduct thorough background checks on potential employees. All resources can be applied to domestic and international investigations.

Among many other techniques, the attendees will learn how to conduct the following queries.

Conduct advanced search queries on dozens of search engines simultaneously
Access restricted information through cached results
Use online translation tools to automate search and translate foreign text
Obtain extended information from personal Facebook profiles
Obtain extended information from Facebook business profiles
Identify personal and business associations on Facebook
Locate and analyze live Facebook video streams
Locate and analyze live Periscope video streams
Identify social networks related to cellular telephone numbers
Locate deleted content from Twitter accounts
Monitor live content and communication on Twitter
Locate posts from private Instagram accounts
Conduct thorough searches of all social networks
Access content believed to be hidden on social networks

Day Two:

Open Source Intelligence Techniques Part II

This session identifies and demonstrates several additional free online resources that can aid internet investigators with any type of internet research. This second day focuses on retrieving relevant information about your investigation outside of standard social network resources.

Among many other techniques, the attendees will learn how to conduct the following queries.

Reverse search photographs for additional copies and details
Locate online videos related to subject of investigation
Reverse search videos for additional copies and details
Break through common pitfalls with YouTube restrictions
Break through common pitfalls with LinkedIn searching
Identify users of private cellular telephone numbers
Search historical deleted versions of Websites
Locate documents related to target subject
View multiple satellite image collections of any location
Locate personal addresses of practically anyone
Retrieve Caller ID information from any landline or cellular telephone number
Identify all social networks in use by target username
Search public file storage services for target data

Day Three:

Intel Analysis Software

This session will provide instruction on the use of Buscador, which is a Linux Virtual Machine that is pre-configured for online investigators. This includes the following pre-built applications.

Custom Firefox Install and Add-Ons
Custom Chrome Install and Extensions
Tor Browser
Custom Video Manipulation Utilities
Custom Video Download Utility
Wayback Exporter
HTTrack Cloner
Web Snapper
Knock Pages
Twitter Exporter

Virtual Android Devices

Many new social networks and communication methods only exist as applications on smart devices. There are no options to search much of this data within standard Websites. This session will explain from start to finish the procedure of setting up a virtual smart device on your computer. The computer program will have the appearance and function of a smart phone. This application will allow you to replicate every mobile app and anonymously search user information. GPS spoofing will allow you to create the appearance of being at any location of interest and geo-based apps will allow you to monitor individuals at the location. An investigative virtual Android device will be created live in the class and can be replicated by each attendee. All apps will also be installed and configured during this session.

Live Complete Privacy & Security Crash Course

This live 2-day course will explain how to be digitally invisible. You will make your communications private, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, and home address hidden. You will remove all personal details from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will remove yourself from the system. When taken to the extreme, you will be impossible to compromise.

Contact us to book this training!

Day One

The first day will focus on anonymity topics:

Self-Background Check
Social Networks
People Directory Removal
Data Broker Removal
Data Marketers
Credit Companies
Anonymous Purchases
Anonymous Credit Cards
Anonymous Telephones
Future Habits
Anonymous Physical Address

Day Two

The second day of will focus on computer and online security topics:

Smartphone Threats
Encrypted Messaging and Voice Communications
Passcodes and Encryption
Location Services
Exif Data
Video MetaData
App Permissions
Lost-Device Apps
Computer Security Best Practices
Anti-Virus and Anti-Malware
Internet Browser Selection and Setup
Online Account Security
Full Disk Encryption
File Level Encryption
Secure File Deletion
System Clean-Up
Tor and Virtual Private Networks
Wi-Fi Security and Best Practices
Email Accounts and Email Encryption

Optional Purchase: OSINT & Privacy Textbooks

All attendees receive access to the digital resources and software demonstrated during this course. We also offer Michael Bazzell's 500 page textbook The Complete Privacy & Security Desk Reference as an optional purchase. Our bulk rate is passed on to you in order to provide a complete detailed textbook for the entire course. Please contact us for details and pricing.

Training Resources

Login no longer required. All resources for the live training classes are now publicly available:

Online Tools
Online Links
Android Tools
Linux Buscador VM
CyberCrime Links

NOTE: The Linux VM replaces the previous Windows Software Pack, which is no longer used in the live training.


The Sixth Edition of the book on internet search techniques is now available. Click the book below for details.

Suggested VPN

We currently recommend Private Internet Access (PIA) as our VPN of choice. While we are an affiliate of PIA, we also use it every day on all of our devices, and have for several years. If you would like to learn why we use PIA, CLICK HERE.