Our lecturers have been commissioned by private individuals, companies and various government organizations for decades to conduct digital investigations into the detailed backgrounds of (major) criminal organizations, missing persons, frauds, swindlers, financial data, international real estate and (fraudulent) companies used for criminal activities. All of this knowledge has resulted in a study program that cannot be rivaled by any other educational institution. We possess an independently developed “OSINT-SOCMINT’ database consisting of hundreds of Internet tools, software and information sources. This database enables the screening of nearly every company and person in the world, the tracing of (missing) persons, or the online ‘monitoring’ of organizations and their activities and undesirable plans.

We would like to share our knowledge with you. In 4 group lesson days, distributed over four weeks, we will teach you how to collect digital information by means of, for example, the ‘World Wide Web’ or ‘Dark Web’. We will teach you to penetrate deeply into shielded digital sources in a completely legal manner. These group lessons will be supplemented by a complete home-study package in the form of true cases. Obviously, we will pay a great deal of attention to the structuring, analysis and reporting of digital research during the lessons.

We do not teach our students any ‘Google’ or ‘General Research’ tricks during this program. We teach a complete intelligence methodology and strategy that enables students to quickly and effectively gather the most hidden and up-to-date intelligence and information.

This program is suitable for anyone who needs to be able to gather – in a professional capacity – (background) information or intelligence concerning people, (inter)national companies, organizations or activities in support of a criminal or civil legal investigation, the protection of business interests or the safeguarding of (international) Public Order and Safety. In order to accomplish this, you will be intensively taught the latest technologies and developments in the field of Open Source & Social Media Intelligence. Moreover, this training program includes various elements of the ‘Ethical Hacker’ phenomenon. To be able to participate in this program, you must possess sufficient practical knowledge of the use of computers and social media.

After completing this training program, you will be able to conduct a digital investigation – independently or in a group – into and gather background information on people, (international) companies, organizations and networks with regard to, among other things, their financial integrity, activities, experiences, locations or places of residence, (non-)performance and assets. Furthermore, you will learn to ‘follow’ people or organizations, and to monitor them through the Internet to determine their (future) plans and activities.


Private, in-company or group lessons?

This study program is normally taught in classes. Nevertheless, given your work, we can imagine that you would like to ask questions freely. In such cases, private lessons might be better for you. You will then receive all the attention from the lecturer and the learning material will be completely tailored to your individual needs. Moreover, you will participate in the training program when it is convenient for you! In addition, it is also possible to organize this training program at your company location for 5 or more participants.


Certification & Recognition

Our educational institution is registered with the CRKBO and is recognized by the International Association for Intelligence Education. Your unique diploma will therefore bear both a name and a number. This will allow external organizations to verify the results and certification obtained by you at our organization – with your permission, naturally.

Start over