Enhance Your OSINT Skills In Numerous Operational Settings

Currently, all training is live and done in an EST time zone.

Although the class is only two days, it is jam packed with content and sets you up for success learning the material. I enjoyed the challenge of the Capstone at the end and putting to practice the tools learned.
Wade Bowman
Geospatial Intelligence Team Leader at U.S. Navy
Justen's OSINT classes are full of valuable, practical information. He will really help you improve your skills.
Heidi Meyers
Immigration and Economic Sanctions Attorney at Law Office of Heidi J Meyers
I recently completed his OSINT Risk Course and couldn't have been more impressed with his expertise and ability to convey sound concepts for utilizing OSINT across a range of problem sets. His depth and breadth of knowledge were evident from the very beginning of the training course.
Brian Antol
Former FBI Senior Executive

Courses

Using OSINT to Identify Front Companies Webinar

$ 200.00 USD
Upcoming Dates
  • Training Concluded. Recording Will Be Sent Within 24 Hours of Purchase.
Overview

In this 90 minute training, we will cover front companies, how they use social media, the red flags to look for with front companies, how to tie some of these businesses back to countries like China, Russia, and Iran etc., and how to go from one front company to a much more extensive network of connected front companies.

The training video will be delivered via email 24 hours after purchase.

OSINT Risk Discovery

$ 750.00 USD
Upcoming Dates
  • November 10-11: 1:30 PM - 5:00 PM EST
Overview

This course is designed for investigators and analysts seeking to sharpen their ability to uncover risks and threats in the digital landscape. You'll learn how to leverage open-source intelligence (OSINT) to detect fraud, foreign influence operations, and supply chain vulnerabilities. The training includes instruction on conducting deep due diligence on businesses, with a capstone project focused on investigating either a suspicious investment entity or a front company trafficking in illicit goods. You’ll also explore how threat actors exploit the online environment, and how to monitor their behavior and tactics effectively. Additional modules cover intermediate geolocation techniques, advanced domain analysis, and research methods for navigating threats across foreign social media platforms.

No items found.

Monthly briefs. Zero fluff. You in?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
No items found.