IntelTechniques Online Video Training

Important Note:

On August 1, 2019, we will stop accepting new members to the online IntelTechniques OSINT, Privacy, & Cyber video training. This post explains our decision and how you can enroll before the deadline.

Simple and Fair Pricing

You can order your online video training with any credit card right now and receive UNLIMITED access to our entire training catalog during your membership!

These courses, with over 300 videos containing over 100 hours of real content, replicate our entire arsenal of live training resources. All packages now include FULL ACCESS to our OSINT, Privacy, and Cyber courses. You only need to choose the length of membership for the training (discounted renewals are available at the end of each). Click below to order and start your training today!

                                                                      

 

                                                                      

We have replicated our entire live training within these detailed video courses. Nothing was left out of this 100-hour catalog, which encompasses more content than our complete two-week live training program. Each training module consists of several videos (units). Each video will prompt you at the end to continue to the next training segment and allows you to document your progress. You can expand the content of each module by clicking the titles to the lower right, and launch the videos inside each link after logging in. The status indicator always displays your current progress and takes you to the next video in the course at any time. Your membership provides you immediate access to all of our videos, priority support directly with Michael Bazzell, monthly video updates, all software downloads and online search tools, advanced resources, and discounted renewals. Instead of providing expensive individual videos, we give you everything at once at a much more affordable price.

Internet Search (OSINT) Training

Our most popular course demonstrates new online investigation techniques that are vital to any Investigator's arsenal of tools. This is a complete course intended on teaching a unique response to online investigation with unconventional free resources. Members receive the following:

Unlimited access to the entire 80+ hours of video content in our OSINT library (During membership)
New video tutorials every month (During membership)
Direct support with Michael Bazzell (During membership)
Lifetime access to the Private Search Tools
Lifetime access to the Linux OSINT Virtual Machine
Lifetime access to the Windows software pack with pre-configured applications
Lifetime access to the Mac software pack with pre-configured applications
Lifetime access to the Private Web Forum
Lifetime access to the Public Web Forum Archive (28,000 posts)

Privacy Training

This 25+ hour video course will explain how to be digitally invisible. You will make your communications private, internet connections anonymous, computers hardened, identity guarded, purchases secret, accounts secured, and home address hidden. You will remove all personal details from public view and will reclaim your right to privacy. You will no longer give away your intimate details and you will remove yourself from the system.

Cyber Training

This 3 hour video course replicates the keynote sessions presented by Michael Bazzell. If you missed a live corporate session, this is the next best thing.

Unlimited Access to Videos During Membership

Learn what you want, when you want, from our entire course library. Watch from your computer, tablet, or mobile device. Download free software solutions for easy online searching. Revisit any content when needed.

Over 300 Videos

Find what you need in our growing library. New videos added monthly for all levels of technical skill. Browse for a specific topic or follow the guided course. You set the pace with over 80 Hours of OSINT videos and 25 Hours of Digital Privacy & Security videos.

Experience

There are numerous options for online OSINT and Privacy training. However, this is the only option presented entirely by government experts actively working as full-time online investigators. Our instructors share the experiences learned during criminal investigations on behalf of top law enforcement agencies.

Certificate

Receive a Certificate of Completion at the end of your training to document your education. We can verify your training to third parties at your request.

Massive Video Library

Please browse our entire library of over 300 videos by clicking through the course modules to the right. We also add new videos every month. Below are the updates over the past few months.

July 2019: OSINT: Email Search IV
July 2019: OSINT: Business Facebook Ads
July 2019: OSINT: Private Web Forum
July 2019: PRIVACY: Wire
June 2019: OSINT: Facebook 05 (Graph Search)
June 2019: OSINT: Facebook 04 (Graph Search)
June 2019: OSINT: Facebook 03 (Update)
June 2019: OSINT: Facebook 02 (Update)
June 2019: OSINT: Facebook 01 (Update)
June 2019: OSINT: Search Tools (Update)
June 2019: OSINT: Buscador Instaloader
June 2019: OSINT: Buscador Metadata
June 2019: OSINT: Buscador Twint
June 2019: OSINT: SSID Tool
June 2019: OSINT: Elastic Search Databases
June 2019: OSINT: Virtual Currencies Tool
May 2019: OSINT: Buscador App Updates
May 2019: OSINT: Buscador Twitter Utilities
May 2019: OSINT: Buscador Instagram Utilities
May 2019: OSINT: Buscador SkipTracer
May 2019: PRIVACY: Home Firewall 1
May 2019: PRIVACY: Home Firewall 2
May 2019: PRIVACY: Home Firewall 3
May 2019: PRIVACY: Home Firewall 4
May 2019: OSINT: Android Emulation Intro
May 2019: OSINT: Android Emulation Update
May 2019: OSINT: YouTube Deleted Content
May 2019: OSINT: Advanced Options Intro
May 2019: OSINT: Advanced Web Scraping I
May 2019: OSINT: Advanced Web Scraping II
April 2019: OSINT: Vehicle Search Update
April 2019: OSINT: Business Records
April 2019: OSINT: March 28 Webinar
March 2019: OSINT: Email Search III
March 2019: OSINT: Domain / IP V
March 2019: PRIVACY: Browser Testing
February 2019: OSINT: Buscador 2.0 Introduction
February 2019: OSINT: Buscador 2.0 VirtualBox
February 2019: OSINT: Buscador 2.0 VMWare
February 2019: OSINT: Buscador 2.0 Browsers
February 2019: OSINT: Buscador 2.0 Updates
February 2019: OSINT: Buscador 2.0 Video Download
February 2019: OSINT: Buscador 2.0 Video Utilities
February 2019: OSINT: Telephone Search
February 2019: PRIVACY: Browser Configuration
January 2019: OSINT: SpecialK Spam Data
January 2019: OSINT: Usenet Archive I
January 2019: OSINT: Usenet Archive II
January 2019: OSINT: Usenet Archive III
January 2019: OSINT: Email/User Leaks IV
December 2018: OSINT: LinkedIn Email Search
December 2018: OSINT: LinkedIn Data Sets
December 2018: OSINT: Consumer Data Sets
December 2018: PRIVACY: Mac Antivirus Update
November 2018: OSINT: Email/User Leaks III
November 2018: OSINT: Search Tool Update
November 2018: OSINT: Darknet Investigations
November 2018: OSINT: Hunchly
October 2018: OSINT: Email/User Leaks II
October 2018: OSINT: Event Monitoring
September 2018: OSINT: Android Emulation V
August 2018: OSINT: Documentation Techniques
August 2018: OSINT: Criminal Markets I
August 2018: OSINT: Criminal Markets II

Video Training Login

Training Resources

PLEASE NOTE: You must be logged in to load the following pages. If you are looking for the tools from the LIVE training, please CLICK HERE.


Course Progress


Latest Videos


Priority Support


Private Search Tools


Private Forum


Software Downloads


Advanced Resources


API Resources


Renew Your Membership

OSINT Course

1 Introduction | 1 HR+
1 OSINT Introduction
2 OSINT Search Tool
3 Private Web Forum
4 VPN Usage
2 Buscador VM | 5 HR+
1 Buscador Introduction
2 Buscador VirtualBox
3 Buscador VMWare
4 Buscador Updates
5 Buscador App Updates
6 Buscador Browsers
7 Buscador Video Download
8 Buscador Video Utilities
9 Buscador Twitter
10 Buscador Twint
11 Buscador Instalooter
12 Buscador Instaloader
13 Buscador Metadata
14 Buscador SkipTracer
15 Windows Virtual Machine
3 Search Engines | 5 HR+
1 Search Introduction
2 Search Operators
3 Google Options
4 Bing Options
5 Alternative Engines
6 International Search
7 Newsgroups
8 Online News
9 Newspaper Archive
10 FTP Search
11 Search Alerts
12 Google Update
13 Custom Engines
14 Google Date
15 Dark Web
16 Dark Web II
17 Wayback Search
4 Covert Accounts | 2 HR+
1 Covert Account Creation
2 Covert Account Update
3 Covert Facebook Update
5 Social Networks | 5 HR+
1 Introduction
2 Facebook 1
3 Facebook 2
4 Facebook 3
5 Facebook 4
6 Facebook 5
7 Twitter 01
8 Twitter 02
9 Twitter 03
10 Twitter 04
11 Instagram
12 SN Update
6 Mapping | 2 HR+
1 Google Maps
2 Bing Maps
3 Maps Tools
4 Mapping Update I
5 Mapping Update II
7 Photographs | 2 HR+
1 Photos Search
2 Reverse Search I
3 Reverse Search II
4 Twitter Images
5 Photo Metadata
6 Photo Manipulation
8 Deleted Data | 1 HR+
1 Cached Data
2 Website Archives I
3 Website Archives II
9 People Search | 3 HR+
1 People Search I
2 People Search II
3 Voter Records
4 White Pages
5 Government Records
6 International Search
7 Gift Registries
8 Source Code
10 Documents | 2 HR+
1 Shared Documents
2 Document Search I
3 Document Search II
4 Leaked Documents
5 Document Search Tool
11 Businesses | 2 HR+
1 LinkedIn
2 LinkedIn Email Search
3 Resumes
4 Business Records
5 Facebook Ads
12 Online Communities | 3 HR+
1 eBay
2 Craigslist
3 Classifieds
4 School Alumni
5 Dating Sites
6 Tinder I
7 Tinder II
8 Reddit I
9 Reddit II
10 Criminal Markets I
11 Criminal Markets II
12 Darknet Investigations
13 Virtual Currencies I
14 Virtual Currencies Tool
13 Email & User Names | 3 HR+
1 Email Search
2 Email Search II
3 User Names I
4 User Names II
5 Email/User Leaks
6 Email/User Leaks II
7 Email/User Leaks III
8 Email/User Leaks IV
9 Email Search III
10 Email Search IV
11 Email Investigation Webinar
14 Telephone Numbers | 1 HR+
1 Telephone Search
15 Crime Data | 1 HR+
1 Crime Data
16 Videos | 2 HR+
1 Videos Search
2 YouTube I
3 YouTube II
4 YouTube Deleted Content
5 Reverse Video Search
17 Domains/IP Addresses | 3 HR+
1 Domains
2 IP Addresses
3 Shodan & Wigle
4 SSID Tool
5 Domain / IP II
6 Domain / IP III
7 Domain / IP IV
8 Domain / IP V
9 URL Shorteners
18 Miscellaneous Data | 2 HR+
1 Forums
2 Vital Records
3 Professional Records
4 Vehicle Records
19 APIs | 2 HR+
1 API Introduction
2 Pipl API
3 Full Contact
4 Caller ID I
5 Caller ID II
6 Flickr API
20 Applications | 10 HR+
1 Windows Introduction
2 Firefox I
3 Firefox II
4 Firefox III
5 Firefox IV
6 Browser Scripts
7 Firefox Containers
8 Tor Browser
9 Screen Capture
10 HTTrack
11 Video Extract
12 Video Player
13 Video Converter
14 Video Eliminator
15 Audio Extract
16 Video Metadata
17 Google Earth
18 Exif Tool
19 FOCA
20 Metagoofil
21 User Lookup
22 Email Harvester
23 Knock Pages
24 SubBrute
25 IP/Domain Info
26 Twitter Export
27 SearchDiggity
28 OS Forensics
29 Recuva
30 Creepy
31 InstagramDL
32 ExtractFace
33 ForeVid
34 Periscope Downloader
35 Video Downloader
36 CCleaner/BleachBit
21 Mac Applications | 2 HR+
1 Mac Introduction
2 Mac Web Browser
3 Video Downloader
4 Video Utilities
5 Instagram Download
6 Screen Capture
22 Android Emulation | 4 HR+
1 Android Emulation Intro
2 Android Emulation I
3 Android Emulation II
4 Android Emulation III
5 Android Emulation IV
6 Android Emulation V
23 Investigation Methods | 3 HR+
1 Caller ID Spoofing
2 Google Voice
3 IP Logger I
4 IP Logger II
5 Frequency Monitoring
6 Email Assumptions
7 Avoiding Analytics
8 OSINT Flowcharts
24 Documentation | 2 HR+
1 Documentation Techniques
2 Download Tools
3 Event Monitoring
4 Hunchly
25 Data Sets | 3 HR+
1 LinkedIn Data
2 Consumer Data
3 SpecialK Spam Data
4 Usenet Archive I
5 Usenet Archive II
6 Usenet Archive III
7 Elastic Search Databases
26 Advanced Options | 3 HR+
1 Advanced Introduction
2 Buscador Recon-ng
3 Web Scraping I
4 Web Scraping II
27 Certificate+
1 Certificate

Privacy Course

1 Privacy Introduction | 1 HR+
1 Privacy Introduction
2 Computer Security | 4 HR+
1 Windows vs Mac
2 Windows: AntiVirus
3 Windows: AntiMalware
4 Windows: Cleaners
5 Windows: CCEnhancer
6 Windows: System Settings
7 Windows: OOSU 10
8 Mac: AntiVirus
9 Mac: AntiMalware
10 Mac: Cleaners
11 Mac: Onyx
12 Mac: Little Snitch
13 Mac: Objective-See
14 Mac: System Settings
3 Web Browser Security | 3 HR+
1 Browser Configuration
2 uBlock Origin
3 Browser Containers
4 Browser Agents
5 Tor Browser
6 Browser Testing
4 VPNs | 1 HR+
1 Virtual Private Networks
5 Preparation | 2 HR+
1 Preparation Introduction
2 Email: GMX
3 Email: 33Mail
4 Google Voice
5 Online Fax
6 Mail Control
6 Self Pre-Assessment | 1 HR+
1 Self Pre-Assessment
7 Self-Background | 1 HR+
1 Self Background Check
8 Online Accounts | 4 HR+
1 Password Policies
2 Password Manager: Local
3 Password Manager: Web
4 Two Factor Authentication
5 Authy
6 Yubikey Static
7 Keepass & Yubikey
8 KeePassXC Browser
9 Data Removal | 3 HR+
1 Personal Data Removal I
2 Personal Data Removal II
3 Personal Data Removal III
4 Personal Data Removal IV
5 Personal Data Removal V
6 Personal Data Removal VI
7 Personal Data Removal VII
10 Credit Companies | 1 HR+
1 Credit Reports
2 Credit Freeze
11 Purchases | 1 HR+
1 Purchases Introduction
2 Blur Masked Cards
3 Privacy Masked Cards
12 Telephones | 2 HR+
1 Hardware
2 Service
3 VOIP-Android
4 VOIP iOS
13 Communications | 2 HR+
1 Email
2 Messaging
3 Telephone
4 Wire
5 Checksums
14 Smartphone Security | 2 HR+
1 Smartphone Introduction
2 Smartphone Android
3 Smartphone iOS
15 Data-at-Rest | 1 HR+
1 Full Disk Encryption
2 File Container Encryption
16 Virtual Machines | 1 HR+
1 Stateless Machines
2 Persistent Machines
17 Aliases | 1 HR+
1 Aliases
18 Disinformation | 1 HR+
1 Disinformation I
2 Disinformation II
19 Future Monitoring | 1 HR+
1 Future Monitoring
2 Canary Tokens
20 Government Records | 1 HR+
1 Government Records
21 Home Firewall | 2 HR+
1 Home Firewall 1
2 Home Firewall 2
3 Home Firewall 3
4 Home Firewall 4
22 Privacy Conclusion+
1 Privacy Conclusion
23 Certificate+
1 Certificate

Cyber Course

1 Cyber Introduction+
1 Cyber Introduction
2 Cyber Phishing+
1 Cyber Phishing
3 Password Attacks+
1 Password Attacks
4 Social Network Attacks+
1 Social Network Attacks
5 Telephone Attacks+
1 Telephone Attacks
6 Internet of Things+
1 Internet of Things
7 Wireless Attacks+
1 Wireless Attacks
8 Cyber Summary+
1 Cyber Summary