OSINT Training

We strive to offer the best OSINT training courses available.

ProQual Level 1 Award in Open Source Intelligence (OSINT)


This Ofqual approved, accredited course will introduce you into the world of open source
intelligence (OSINT) and provide you with the vital inital steps to obtain improved results from your
research. It will explain how the fundamental components of the internet work, such as web
browers and search engines. It will explore boolean searches and how to get focused results from
your research. The course is practically based with students learning to build complex search strings
within search engines to enable focused results. It will explore legal, welfare and security aspects in
a broad context. It will focus on using OSINT in different areas such as people, images, videos,
organisations and places.


This qualification is an introduction to open source research and intelligence (OSINT). It will explore
the fundamental methods used to conduct open source research and is designed for people entering
any profession where internet research is needed. It will enhance a student’s online research
capability as you discover the hidden functionality available within search engines and gain an
awareness of the depth of freely available tools and resources.

Intended Audience

The qualification is suitable for anyone whose work involves research conducted on the internet
including recruitment, due diligence, threat monitoring, intelligence analysis, warning and reporting,
investigation, KYC or as part of a company security team.


No previous experience is required.


The course will be taught in English. All students will need to prove an ability to speak good English.

Delivery Style

Online students will be provided with a secure link to our internationally respected training delivery
portal “Moodle” with video teaching, examples and case studies with online support and feedback
to succeed. The classroom based course will be 50% instructor led theory, 40% practical session and
10% classroom discussion. These lessons will be supplemented with printable user guides and
additional resources. A personal tutor will be on hand to support them.


Online students can pace their studies for themselves and work at whatever time suits them –
typically, achieving course completion in the range of 2 weeks to 1 month from enrolment.
Classroom based courses are 2-3 days with additional time required to complete assignments.


Students will be assessed throughout the course. Both classroom and online students will complete
their assignments online. The tutor will support them through this process.


1. Course Introduction

We set out the course structure and the assessment process.

2. Environment

We ensure you have a thorough understanding of the internet and its component parts, which is explained in a non-technical way to make it easy to understand.

3. Search Techniques

We explain and practice the use of search operators using Boolean search strings. We highlight the power of Boolean searching and demonstrate this with a wealth of examples.

4. Security

We highlight the risks to be considerd when conducting online research and then demonstrate best practise measures to maintain a safe and secure way to conduct intelligence gathering.

5. Legal & Welfare

We highlight the issues and considerations that need to be addressed during any research. We look at ethical, moral and legal considerations and touch on GDPR and its impacts.

6. Tools and Resources

We examine how to find and utilise free tools and resources which add power to your research and ultimately provide a more comprehensive understanding.

7. Source Verification

We explore the need to seek verification of research results and the checks and balances that can be put in place before content is reported.

8. Browsers & Search Engines

We ensure that you understand the different types of search engines and browsers – and how to get the most optimum results from them.

9. Localised Searching

We explore how best to focus any online searching in an effective and efficient manner.

10. Video & Image Searching

We examine different media types and how to effectively utilise resources to investigate and explore video and imagery media content.

11. Investigating People

We look at workflows designed to explore the opportunities available when researching individuals, looking at names, usernames, mobile numbers and email addresses.

12. Investigating Organisations

We look at workflows designed to safely explore the opportunites available when researching organisations, looking at databases and other resources that can assist an intelligence requirement.


For classroom courses, we can assist with local accommodation bookings in the Bath area. Tea,
coffee and soft drinks are provided throughout the course as well as a buffet lunch. (Special dietary
requirements must be noted at the time of booking)

For more information, or to book this course, please email training@intelmsl.com or use our online enquiry form.

Open Source Intelligence Insights

What is Open Source Intelligence?

What Is Open Source Intelligence (OSINT)? – How is it applied?

Open-source intelligence (OSINT) can reveal invaluable insights about people, organisations, locations, events and more by leveraging publicly available online information. But the most skilled intelligence analysts understand OSINT’s limitations in isolation. By integrating digital tracking with on-the-ground human intelligence (HUMINT), specialists develop a holistic 360 view of complex situations and targets. TABLE OF CONTENTS In… Read More from What Is Open Source Intelligence (OSINT)? – How is it applied?

The Positive and Negative Potential of the Dark Web

​​Sharks and Mermaids in the Deep: The Positive and Negative Potential of the Dark Web

The dark web, a term that evokes images of shadowy corners of the internet, is a place of contradictions. It is a world within a world, an underbelly of the internet that is both feared and celebrated, depending on whom you ask. Often portrayed as a haven for criminal activity, akin to sharks lurking in… Read More from ​​Sharks and Mermaids in the Deep: The Positive and Negative Potential of the Dark Web

Tracing the Untraceable – Our work with GRC

IMSL are proud to support the work of GRC (Global Rights Compliance) and FYF (Free Yezidi Foundation) and to see our work recognised in this article. In support of GRC, we continue to work on a number of international projects bringing our collective expertise to support those persecuted by oppressive regimes…. Read More from Tracing the Untraceable – Our work with GRC