Live Training Sessions

We offer two unique live courses that are presented by various instructors, all of which were personally trained by Michael Bazzell. The Open Source Intelligence Techniques (OSINT) training is a 3-day class which presents all of the latest advanced methods of locating online information. The optional Privacy & Security Crash Course is a 1-day add-on focused on protecting your digital information and reclaiming your right to true privacy. Details of both are available in the links below.

Live OSINT Training Sessions

During our 3-day Open Source Intelligence course, We demonstrate new investigation techniques that are vital to any Investigator's arsenal of tools. This is a very full three days of instruction intended on teaching a unique response to online investigation with unconventional free resources. Participants receive access to the entire Investigations Resources area of the site which includes the following:

A complete updated list of all OSINT resources
OSINT cheat-sheets covering the most useful commands and tools
A custom online search tool which automates many search processes
A custom Linux OSINT Virtual Machine ready for immediate use
A pre-configured portable browser with investigation extensions
Updated online materials for all training sessions
Practical exercises and live scenarios Customizable digital notebooks and report templates

Contact us to book this training!

Day One:

Open Source Intelligence Techniques Part I

This session identifies and demonstrates numerous free online resources that can aid internet researchers in solving both technical and non-technical investigations. Participants will be shown how to "dig" into the internet for personal information about any target. While popular sites such as Twitter, Instagram, and Facebook are covered in detail (including techniques that legally access some "hidden" content), the presentation goes much deeper into the vast resources available online for researching personal information. This first day focuses on building a repeatable and articulable process for investigating targets on the most popular social networks and proper retrieval of located information. The class will see first-hand how to not only locate and collect online information, but also how to translate it into actionable intelligence. We will locate, capture, and organize online evidence that can be used for internal investigations, employment backgrounds, competitive intelligence, or criminal/civil court proceedings.

Among many other techniques, the attendees will learn the following skills:

Ethics, privacy and legal considerations when conducting online investigations
Build a secure and efficient investigative workstation
Proper data collection and documentation
Conduct advanced search queries on dozens of search engines simultaneously
Access restricted information through cached results
Use online translation tools to automate search and translate foreign text
Obtain extended information from personal Facebook profiles
Identify personal and business associations on Facebook
Locate and analyze live Facebook video streams
Methodology in collecting Facebook data for preservation and reporting
Identify and analyze a target’s Twitter profile
Locate and capture imagery and video streams
Locate deleted content from Twitter accounts
Monitor live content and communication on Twitter
Identify social networks related to cellular telephone numbers
Investigate Instagram accounts and search for hidden/privatized data
Locate social media accounts based on a target’s “real-name”
Query email addresses and identifying associated accounts
Identify all social networks in use by target username
Access content believed to be hidden on social networks

Day Two:

Open Source Intelligence Techniques Part II

This session identifies and demonstrates several additional free online resources that can aid internet investigators with any type of internet research. This second day focuses on retrieving relevant information about your investigation outside of standard social network resources. We will also take our first dive into advanced tools such as APIs, Android, emulation, and live demonstrations of the Buscador OSINT operating system.

Among many other techniques, the attendees will learn how to conduct the following queries.

Reverse search photographs for additional copies and details
Locate online videos related to subject of investigation
Reverse search videos for additional copies and details
Break through common pitfalls with YouTube restrictions
Break through common pitfalls with LinkedIn searching
Identify users of private cellular telephone numbers
Search historical deleted versions of Websites
Locate documents related to target subject
View multiple satellite image collections of any location
Locate personal addresses of practically anyone
Retrieve Caller ID information from any landline or cellular telephone number
Search public file storage services for target data
Application Program Interfaces and their use in online research
Multiple methods of building an Android virtual phone on a desktop
Efficiency and security benefits of using virtual machines
Demonstration of the Buscador OSINT operating system and it’s many tools/features
Locate breach/leak data and discuss investigative applications
Investigate open-web and darknet criminal markets

Day Three:

Intel Analysis Software

This session will provide instruction on the use of Buscador, which is a Linux Virtual Machine that is pre-configured for online investigators. This includes the following pre-built applications.

Custom Firefox Install and Add-Ons
Custom Chrome Install and Extensions
Tor Browser
Custom Video Manipulation Utilities
Custom Video Download Utility
Recon-NG
Maltego
Creepy
Metagoofil
MediaInfo
ExifTool
TheHarvester
Wayback Exporter
HTTrack Cloner
Web Snapper
Knock Pages
SubBrute
Twitter Exporter
Tinfoleak
BleachBit
VeraCrypt
KeePass

Practical Exercises

As a class we will work through multiple investigative scenarios on live targets. This is where we take all the tools and techniques and work through the investigative steps together, from initial reconnaissance on a target and all the way to a completed case report. The class will receive additional practice exercises that they may complete at their own pace. The practical exercises build proficiency using the tools, while also identifying key best practices as well as common pitfalls.

Operational-Security & Privacy

We finish out the training by reinforcing best practices in security and privacy. Students learn the key tools and steps necessary to protecting themselves and their organizations. We have taken the most important components of our privacy training and boiled them down into a concise set of measures that ensure that our hunters do not become the prey.

Privacy & Security Crash Course Add-on

This optional 1-day course add-on will explain how to be digitally invisible. This can be vital when conducting online investigations when your target may start searching for you! You will make your communications private, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, and home address hidden. You will remove all personal details from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will remove yourself from the system. When taken to the extreme, you will be impossible to compromise.

Contact us to book this training!

Optional Purchase: OSINT & Privacy Textbooks

All attendees receive access to the digital resources and software demonstrated during this course. We also offer Michael Bazzell's books as an optional purchase. Our bulk rate is passed on to you in order to provide a complete detailed textbook for the entire course. Please contact us for details and pricing.

Training Resources

Linux Buscador VM

New OSINT Guide

My latest book on Open Source Intelligence (OSINT) is now available! Click HERE for details.


Suggested VPNs


We currently recommend either Private Internet Access (PIA) or ProtonVPN as the best VPNs for most people. We use both for various situations. If you would like to learn why we chose these, please CLICK HERE. To order service with the best discounts available, please use the following links.