OSINT Base Camp course is a springboard to your open source intelligence, cyber investigation, and online research experience. The course will quickly develop your skills and promote you through many aspects of OSINT within this specialist subject. While this course is an entry level for those who want to develop their OSINT skills, the methods, techniques and tools are beyond those of basic to prepare you for more advanced growth. The objective, is to provide each and every student with the OSINT fundamentals to achieve the best in their respective tasks, ranging from intelligence analysts, private and cyber investigators, online researchers, investigative journalists, law enforcement to penetration testers, threat analysts, blue and red team members or those who are just fascinated about the OSINT experience. 

If you are interested in taking this course or require additional information please email us at registration@osint-i1.com


Price: US$ 275.00
 

What you will get:  
  • A proficiency of open source intelligence, online investigations and research 
  • All course material 
  • A 15% discount for a Hunchly license
  • How to document and record information collected 
  • Ethical, legal and policy regarding OSINT and online investigations 
  • Effective search engine such as google, and social media searching 
  • Create the OSINT environment 
  • Real life simulations and OSINT Labs 
  • Full support throughout the course 
  • Life time access to the course and its updates, including webinars 

Students will learn how to collect, analyse and verify information from the vast sea of information commonly known as the internet. 

Course Curriculum

  • 1

    Introduction

    • Welcome and Introduction

    • Course Overview

  • 2

    OSINT Background and Process

    • Background, definition and concept

    • Quiz 1

    • Documenting and Reporting

    • Hunchly install

    • Collection

    • Quiz 2

    • Methodology

    • Sources of OSINT

    • Ethics, legal and policy

    • Quiz 3 end of session

  • 3

    Operational Security (OPSEC)

    • Advisory

    • OPSEC introduction

    • Security software

    • Usernames and passwords

    • Email Accounts

    • Cell phone numbers

    • Virtual Private Network (VPN)

    • Windows user account

    • MAC OSX

  • 4

    OSINT System

    • Operating System 1

    • Operating System 2

    • Operating System Installation

    • Operating System Configuration

    • Browser System

  • 5

    Advanced Search Engine Techniques

    • Basics

    • Introduction

    • Part 1

    • Part 2

    • Simulation 1

    • Part 3

    • Part 4

    • Part 5

    • Part 6

    • Simulation 2

    • Part 7

    • Part 8

    • Part 9

    • Quiz 4

    • Part 10

    • Part 11

    • Part 12

    • Simulation 3

    • Simulation 4

  • 6

    Investigating Usernames

    • Introduction

    • Search Tools

    • Quiz 5

    • Platforms

    • Quiz 6

    • Specific queries

    • Simulation 5

  • 7

    Reverse Image Searching

    • Introduction

    • Part 1

    • Part 2

    • Part 3

    • Simulation 6

    • Simulation 7

  • 8

    Maps and Satellite Images

    • Introduction

    • Part 1

    • Part 2

    • Part 3

    • Part 4

    • Simulation 8

    • Simulation 9

  • 9

    Email Intelligence Gathering

    • Part 1

    • Part 2

    • Part 3

    • Part 4

    • Part 5

    • Part 6

    • Part 7

    • Part 8

    • Part 9

    • Part 10

    • Part 11

  • 10

    Telephone Number Investigation

    • Part 1

    • Part 2

    • Part 3

  • 11

    Social Media Intelligence Gathering

    • Introduction

    • Sock Puppet

    • Facebook Account

    • Facebook 1

    • Facebook 2

    • Facebook 3

    • Facebook 4

    • Facebook 5

    • Facebook 6

    • Facebook 7

    • Facebook 8

    • Facebook 9

    • Quiz 7

    • Facebook 10

    • Facebook 11

    • Twitter Intro

    • Twitter 1

    • Twitter 2

    • Twitter 3

    • Twitter 4

    • Twitter 5

    • Twitter 6

    • Twitter 7

    • Twitter 8

    • Twitter 9

    • Twitter 10

    • Quiz 8

    • Instagram Intro

    • Instagram 1

    • Instagram 2

    • Instagram 3

    • Simulation 10

    • Linkedin intro

    • Linkedin 1

    • Linkedin 2

    • Linkedin 3

    • Linkedin 4

    • Simulation 11

  • 12

    Virtual Machines and Advanced Tools

    • Initial Setup

    • Part 1

    • Part 2

    • Part 3

    • Part 4

    • Part 5

    • Part 6

    • Part 7

    • Part 8

    • Part 9

    • Part 10

    • Part 11

    • Part 12

    • Part 13

    • Part 14

    • Part 15

    • Part 16

    • Part 17

    • Part 18

    • Part 19

    • Quiz 9

  • 13

    OSINT Lab

    • Lab 1

    • Lab 2

    • Lab 3

About the instructor

Wizard of OSINT

Andy F1

My name is Andrew Fordred a Namibian and a Formula 1 fanatic (AndyF1 your first lesson in OSINT: username) but equally passionate about OSINT.My career began in law enforcement with the Crime Intelligence Services of the South African police focusing on terrorism and organised crime, and later was employed in a number of corporate positions.12 years on in 2005 I started my own business.  It was from here that I became massively interested in developing open source investigations in support of due diligence, criminal investigations, and providing intelligence services. I spent many hours developing different techniques and exploring a variety of tools (setting up a VM used to be quite intimidating let alone trying to understand Kali) to extract data from that big open source aka “the internet”, complementing almost any form of investigation or research.Today, not only am I associated with some of the best in the industry but also use python for OSINT collection, tools such as opensearchserver, Kali Linux, Maltego (authorised trainer), Hunchly and others.  The journey hasn’t been easy, the industry is fast paced and it’s hard to keep up.This is my opportunity to share my knowledge with my students, to support you through this journey and help you develop some incredible skills for effective and powerful open source investigations.