A Highly Interactive Training Course On

Internet Intelligence Investigation (III) Master Class

Mastering Advanced Open-Source & Digital Investigation Techniques for Cyber and Real-World Applications

Internet Intelligence Investigation (III) Master Class
Course Schedule

CLASSROOM

10-14 Nov 2025
Dubai
$5,950
06-10 Jul 2026
Dubai
$5,950
21-25 Sep 2026
Dubai
$5,950
14-18 Dec 2026
London
$5,950

ONLINE

09-13 Feb 2026
Online
$3,950
27 Apr-01 May 2026
Online
$3,950
Certificate
  • Coventry Academy Certificate of Attendance will be provided to delegates who attend and complete the course

Training Overview

Training Overview

In today’s digital era, the internet is far more than a tool for communication—it’s a sprawling landscape of personal, organizational, and covert information. For professionals in security, compliance, law enforcement, corporate risk, and investigative journalism, navigating this environment presents complex challenges in tracing online activity, identifying risks, and gathering reliable intelligence.

The Internet Intelligence Investigation (III) Master Class training course is designed to equip participants with the expertise needed to conduct advanced online investigations. This comprehensive course goes well beyond basic search skills, offering in-depth training in open-source intelligence (OSINT), deep and dark web exploration, social media analysis, digital forensics, and link analysis. Through real-life case studies and hands-on labs, participants will develop a disciplined investigative approach—learning how to uncover hidden relationships, verify digital information, and convert fragmented online data into clear, actionable evidence that supports legal, security, or corporate objectives.

What are the goals?

By the end of this training course, participants will be able to:

  • Master the fundamentals and advanced methodologies of OSINT
  • Use specialized tools to uncover and map online identities and networks
  • Navigate deep web and dark web platforms safely to collect intelligence
  • Conduct link analysis and metadata tracing to establish connections
  • Employ ethical & legal frameworks for internet investigations
  • Compile findings into actionable intelligence reports suitable for decision-makers or legal proceedings

Who is this Training Course for?

This training course is suitable to a wide range of professionals but will greatly benefit:

  • Cybersecurity & IT security professionals
  • Law enforcement & intelligence officers
  • Fraud & compliance investigators
  • Risk & corporate security managers
  • Due diligence & background screening teams
  • Journalists and researchers focused on digital investigations

How will this Training Course be Presented?

This training course will utilize a variety of proven adult learning techniques to ensure maximum understanding, comprehension and retention of the information presented. The facilitator will provide interactive presentation that incorporates slides, videos, group discussion, and practical exercises to examine all aspects of the topic.

The Course Content

Day One: Foundations of Internet Intelligence Investigation
  • Introduction to Internet Intelligence & OSINT: scope, principles, ethical and legal considerations
  • Understanding the surface web, deep web, and dark web
  • Browser configurations & operational security (OpSec) for investigators
  • Essential OSINT frameworks and methodologies
  • Hands-on: configuring investigation environments and secure browsing setups
Day Two: Advanced Open Source & Social Media Intelligence
  • Using advanced search operators & meta-search engines
  • Social media investigations: extracting intelligence from Facebook, LinkedIn, Instagram, X (Twitter), TikTok
  • Tools for social media mapping & sentiment analysis
  • Case study exercise: profiling a digital target across multiple platforms
  • Techniques for archiving and verifying social media evidence
Day Three: Deep Web, Dark Web, and Specialized Platforms
  • Exploring Tor, I2P, and dark web markets safely
  • Identifying threat actors & illicit marketplaces
  • Monitoring hacker forums, paste sites, and encrypted messaging groups
  • Cryptocurrency tracing basics: following Bitcoin transactions
  • Hands-on: accessing and navigating dark web directories for intelligence gathering
Day Four: Digital Forensics, Metadata & Link Analysis
  • Extracting and analyzing metadata from documents, images, and emails
  • Using tools for email header and domain analysis
  • Visualizing connections with link analysis software (e.g., Maltego, Spiderfoot)
  • Workshop: building network diagrams to reveal hidden relationships
Day Five: Compiling and Presenting Investigative Intelligence
  • Structuring findings for actionable reporting
  • Best practices for building timelines, evidence chains, and summary dossiers
  • Legal considerations: preserving chain of custody, privacy, and compliance
  • Final group exercise: conduct a guided mini-investigation from data collection to presentation
  • Review & course wrap-up: building an ongoing investigation toolkit

Providers and Associations

Anderson
Anderson
Aztech Training
Aztech Training
COPEX
COPEX