top of page

For Investigators, By Investigators

OSINT Basics

LOGO-RGB.jpg

OSINT Basics (Foundations Course) is a one-day, live, instructor-led course designed to give practitioners a practical and defensible grounding in Open-Source Intelligence. It covers core OSINT principles, legal and ethical considerations, search methodology (including advanced operators), social media reconnaissance, source evaluation, and how to structure findings for investigative and intelligence use. Ideal for those new to OSINT, and for those already using it informally who want a more methodical, evidentially-sound approach.

Summary

Guest Lecturer

Trainer

TBC

1 Day + eLearning

TBC

1 Day + eLearning

Ben M

1 Day + eLearning

Cost

£395 + VAT

£395 + VAT

TBC

Course Length

In Person Cost

£395 + VAT

£395 + VAT

Remote Cost

£395 + VAT

Remote Cost

Remote Cost

£395 + VAT

Level

Foundation

Open-Source Intelligence (OSINT) is now a core capability across investigations, intelligence development, safeguarding, corporate security, and threat assessment. But the difference between “having a look online” and conducting OSINT properly is huge — especially when decisions, casework, or organisational risk sit on the other side of it.


OSINT Basics (Foundations Course) is built to help practitioners develop strong fundamentals and good tradecraft. It’s practical, structured, and focused on producing findings that are repeatable, defensible, and suitable for investigative or intelligence contexts.

This is not a theory-heavy lecture. Delegates learn how to work systematically: how to plan what they’re doing, gather information safely and ethically, validate what they find, and present outputs in a way that stands up to scrutiny.


Who the course is for

This course is designed for:

  • Practitioners new to OSINT, who want a clear and structured starting point

  • Investigators, analysts, and intelligence staff who already use OSINT informally, but want to formalise their approach

  • Safeguarding / harm-reduction roles, where online information supports prevention and risk decisions

  • Supervisors and team leads who want a shared baseline method and a consistent standard across their teams

  • Corporate security / investigations teams needing better tradecraft and confidence in online findings

You don’t need a technical background. What you do need is an interest in becoming more methodical, more accurate, and more confident in the quality of your OSINT outputs.


What the course covers

1) Core OSINT principles, ethics, and legal considerations

Delegates build a clear understanding of what OSINT is (and isn’t), why governance matters, and how to avoid common pitfalls that create risk for organisations and individuals.

Topics include:

  • What “open source” really means in practice

  • Ethical boundaries, proportionality, and professional judgement

  • Defensibility: being able to explain how and why you reached a conclusion

  • Practical ways to reduce risk and avoid overreach

2) Search methodology and advanced operators

Search is a skill — and most people haven’t been taught it properly. This module helps delegates move from ad-hoc Googling to purposeful discovery.

Topics include:

  • Building structured search plans and hypotheses

  • Advanced operators and query construction

  • Using search engines efficiently (and knowing their limitations)

  • Finding the “second layer” of information (cached content, document trails, references, and re-shares)

3) Social media and online platform reconnaissance

Delegates learn how to explore social platforms and online communities methodically — without making assumptions, and without relying on a single screenshot as “proof”.

Topics include:

  • Platform-led reconnaissance techniques

  • Identifying patterns, connections, and supporting indicators

  • Recognising impersonation, satire, and misleading signals

  • Capturing context and avoiding confirmation bias

4) Source evaluation, validation, and evidential considerations

This is where OSINT becomes genuinely useful: separating signal from noise and assessing what is reliable.

Topics include:

  • Assessing credibility, provenance, and recency

  • Corroboration and confidence levels

  • Recognising manipulated content, recycled narratives, and misattribution

  • Recording findings in a way that’s transparent and reviewable

5) Structuring and presenting findings for investigative and intelligence use

If you can’t explain your findings clearly, they won’t survive challenge — internally or externally. Delegates learn simple, practical structures for reporting.

Topics include:

  • Writing clear OSINT summaries and intelligence-style outputs

  • Separating fact, assessment, and assumption

  • Presenting confidence and limitations honestly

  • Producing outputs that others can action and review

Learning objectives (what delegates will be able to do afterwards)

By the end of the course, delegates will be able to:

  • Apply a structured OSINT workflow rather than relying on ad-hoc searching

  • Use advanced search operators and effective query strategies to locate relevant material faster

  • Conduct basic platform reconnaissance in a consistent and methodical way

  • Evaluate sources and content using credibility and validation techniques

  • Record and present findings with clear confidence levels, limitations, and defensibility

  • Produce OSINT outputs that are suitable for investigative and intelligence decision-making

Outcomes and takeaways

Delegates leave with:

  • A repeatable OSINT method they can use immediately

  • Improved confidence in what is reliable vs what is assumption or weak inference

  • Better-quality outputs: clearer notes, clearer summaries, and stronger reasoning

  • A more defensible approach that’s easier to justify to supervisors, stakeholders, or decision-makers

Delivery style

This is a live, instructor-led remote course with practical demonstrations and structured exercises throughout the day. Delegates will be guided through techniques step-by-step and shown how to apply them in real working contexts.

CYBER NEST LABS

  • Facebook
  • Twitter
  • YouTube
  • Instagram

© 2025 by Cyber Nest Labs Ltd.

bottom of page