Enhance Your OSINT Skills In Numerous Operational Settings

Currently, all training is live and done in an EST time zone.

This boutique risk firm's perspective is what sets this course apart. Tools come and go, it's the methodology and investigative thinking that make good OSINT; on this front, Unchartered's OSINT Risk Intelligence course beautifully delivers.
Albert Hui
Digital Forensic Investigator at Security Ronin
Justen is a true enthusiast who loves to help people by using his talent. Taking his course on OSINT was informative, I learned a lot of new and unique ways of how to use OSINT to get the best information I want.
Emese Locse
Protection Officer at Malta Government Agency
Justen's expertise OSINT, combined with his profound understanding of Chinese and Iranian influence operations, enables him to offer a highly informative training course that bridges complex concepts with practical application.
Paul Scalzo
Vice President at Morgan Stanley

Course Summaries

Using OSINT to Identify Front Companies Webinar

$ 200.00 USD
Upcoming Dates
  • Training Concluded. Recording Will Be Sent Within 24 Hours of Purchase.

In this 90 minute training, we will cover front companies, how they use social media, the red flags to look for with front companies, how to tie some of these businesses back to countries like China, Russia, and Iran etc., and how to go from one front company to a much more extensive network of connected front companies. The training video will be delivered via email 24 hours after purchase.

OSINT Risk Discovery

$ 750.00 USD
Upcoming Dates
  • November 10-11: 1:30 PM - 5:00 PM EST
Overview

This course is designed for investigators and analysts seeking to sharpen their ability to uncover risks and threats in the digital landscape. You'll learn how to leverage open-source intelligence (OSINT) to detect fraud, foreign influence operations, and supply chain vulnerabilities. The training includes instruction on conducting deep due diligence on businesses, with a capstone project focused on investigating either a suspicious investment entity or a front company trafficking in illicit goods. You’ll also explore how threat actors exploit the online environment, and how to monitor their behavior and tactics effectively. Additional modules cover intermediate geolocation techniques, advanced domain analysis, and research methods for navigating threats across foreign social media platforms.

No items found.

Want weekly OSINT updates?

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
No items found.