Our lecturers have been commissioned by private individuals, companies and various government organizations for decades to conduct digital investigations into the detailed backgrounds of (major) criminal organizations, missing persons, frauds, swindlers, financial data, international real estate and (fraudulent) companies used for criminal activities. All of this knowledge has resulted in a study program that cannot be rivaled by any other educational institution. We possess an independently developed “OSINT-SOCMINT’ database OSIDATA®, consisting of hundreds of Internet tools, software and information sources. This database enables the screening of nearly every company and person in the world, the tracing of (missing) persons, or the online ‘monitoring’ of organizations and their activities and undesirable plans.


We would like to share our knowledge with you.During four days of lessons, we will teach you how to collect digital information by means of, for example, the ‘World Wide Web’ or ‘Dark Web’. We will teach you to penetrate deeply into shielded digital sources in a completely legal manner. These group lessons will be supplemented by a complete home-study package in the form of true cases. Obviously, we will pay a great deal of attention to the structuring, analysis and reporting of digital research during the lessons. We do not teach our students any ‘Google’ or ‘General Research’ tricks during this program. We teach a complete intelligence methodology and strategy that enables students to quickly and effectively gather the most hidden and up-to-date intelligence and information.


This program is suitable for anyone who needs to be able to gather – in a professional capacity – (background) information or intelligence concerning people, (inter)national companies, organizations or activities in support of a criminal or civil legal investigation, the protection of business interests or the safeguarding of (international) Public Order and Safety. In order to accomplish this, you will be intensively taught the latest technologies and developments in the field of Open Source & Social Media Intelligence. Moreover, this training program includes various elements of the ‘Ethical Hacker’ phenomenon. To be able to participate in this program, you must possess sufficient practical knowledge of the use of computers and social media.


Click here for more information regarding our Acknowledgement and Certification


Additional Courses