OSINT Base Camp course is results driven and will springboard your open source intelligence, cyber investigation, and online research experience to a higher level. The course will quickly develop your skills and promote you through many aspects of the OSINT field. While this course is an entry level for those who want to develop their OSINT skills, the methods, techniques and tools are beyond those of basic to prepare and provide you with the confidence to conduct your own research, investigations or intelligence gathering. The objective, is to provide each and every student with the OSINT fundamentals to achieve the best in their respective tasks, ranging from intelligence analysts, private and cyber investigators, online researchers, investigative journalists, law enforcement to penetration testers, threat analysts, blue and red team members or those who are just fascinated about the OSINT experience. 

What you will get:  
  • A proficiency of open source intelligence, online investigations and research 
  • All course material 
  • A 15% discount for a Hunchly license
  • How to document and record information collected 
  • Ethical, legal and policy regarding OSINT and online investigations 
  • Effective search engine such as google, and social media searching 
  • Create the OSINT environment 
  • Real life simulations and OSINT Labs 
  • Full support throughout the course 
  • On completion you will earn your well deserved certificate.
  • Life time access to the course and its updates, including webinars 


Students will learn how to collect, analyse and verify information from a vast array of sources.  

If you are interested in the course and require additional information please email us at registration@osint-i1.com

Course Curriculum

  • 1

    Introduction

    • Welcome and Introduction

    • Course Overview

  • 2

    OSINT Background and Process

    • Background, definition and concept

    • Quiz 1

    • Documenting Collection Data

    • Hunchly install

    • Zotero

    • Zotero 1

    • Zotero 2

    • Zotero 3

    • Collection

    • Quiz 2

    • Methodology

    • Sources of OSINT

    • Ethics, legal and policy

    • Quiz 3 end of session

  • 3

    Operational Security (OPSEC)

    • Advisory

    • OPSEC introduction

    • Security software

    • Usernames and passwords

    • Email Accounts

    • Cell phone numbers

    • Virtual Private Network (VPN)

    • Windows user account

    • MAC OSX

  • 4

    OSINT System

    • Operating System 1

    • Operating System 2

    • Operating System Installation

    • Operating System Configuration

    • Browser System

  • 5

    Advanced Search Engine Techniques

    • Basics

    • Introduction

    • Part 1

    • Part 2

    • Simulation 1

    • Part 3

    • Part 4

    • Part 5

    • Part 6

    • Simulation 2

    • Part 7

    • Part 8

    • Part 9

    • Quiz 4

    • Part 10

    • Part 11

    • Part 12

    • Simulation 3

    • Simulation 4

  • 6

    Investigating Usernames

    • Introduction

    • Search Tools

    • Quiz 5

    • Platforms

    • Quiz 6

    • Specific queries

    • Simulation 5

  • 7

    Reverse Image Searching

    • Introduction

    • Part 1

    • Part 2

    • Part 3

    • Simulation 6

    • Simulation 7

  • 8

    Maps and Satellite Images

    • Introduction

    • Part 1

    • Part 2

    • Part 3

    • Part 4

    • Simulation 8

    • Simulation 9

  • 9

    Email Intelligence Gathering

    • Part 1

    • Part 2

    • Part 3

    • Part 4

    • Part 5

    • Part 6

    • Part 7

    • Part 8

    • Part 9

    • Part 10

    • Part 11

  • 10

    Telephone Number Investigation

    • Part 1

    • Part 2

    • Part 3

  • 11

    Social Media Intelligence Gathering

    • Introduction

    • Sock Puppet

    • Facebook Account

    • Facebook 1

    • Facebook 2

    • Facebook 3

    • Facebook 4

    • Facebook 5

    • Facebook 6

    • Facebook 7

    • Facebook 8

    • Facebook 9

    • Quiz 7

    • Facebook 10

    • Facebook 11

    • Twitter Intro

    • Twitter 1

    • Twitter 2

    • Twitter 3

    • Twitter 4

    • Twitter 5

    • Twitter 6

    • Twitter 7

    • Twitter 8

    • Twitter 9

    • Twitter 10

    • Quiz 8

    • Instagram Intro

    • Instagram 1

    • Instagram 2

    • Instagram 3

    • Simulation 10

    • Linkedin intro

    • Linkedin 1

    • Linkedin 2

    • Linkedin 3

    • Linkedin 4

    • Simulation 11

  • 12

    Virtual Machines and Advanced Tools

    • Initial Setup

    • Part 1

    • Part 2

    • Part 3

    • Part 4

    • Part 5

    • Part 6

    • Part 7

    • Part 8

    • Part 9

    • Part 10

    • Part 11

    • Part 12

    • Part 13

    • Part 14

    • Part 15

    • Part 16

    • Part 17

    • Part 18

    • Part 19

    • Quiz 9

  • 13

    OSINT Lab

    • Lab 1

    • Lab 2

    • Lab 3

FAQ

  • Do you have company or group discounts?

    Yes we offer 15% discount for enrollment from 2 students and more. It must be a one time enrollment, please contact us at csi@thecyberinst.org for details.

  • The discount for Hunchly, may it be used to pay for the annual license after the initial purchase?

    Yes absolutely you may.

  • How many hours of training is the OSINT Base Camp course?

    Currently with all the lessons, simulations and labs the course extends over 30 hours of training.

About the instructor

Wizard of OSINT

Andy F1

My name is Andrew Fordred, my career began in law enforcement with the Crime Intelligence Services of the South African police focusing on terrorism and organised crime, and later was employed in a number of corporate positions. After leaving the police service, he held a number of corporate positions in capacities such as risk management, and later, forensic investigations. In 2007 started my own business providing forensic investigations, intelligence, risk management consultancy, court testimony and litigation support. Also, completed a forensic investigation degree focusing on forensic intelligence with a qualitative case study of the illegal narcotics trade and syndicates. Currently I provide due diligence, cyber intelligence and investigations, cyber security and privacy, and training services to clients with emphasis on open source intelligence, social engineering and the dark web. A public speaker at events such as the Journey of the Hacker Windhoek Namibia, OSMOSIS 2018 Las Vegas USA and Cyber Threats against Children UNICEF. This is my opportunity to share my knowledge with students, to support you through this journey and help you develop some incredible skills and transform knowledge into real results.