Advanced OSINT Training – Systematic Person of Interest & Company of Interest Investigations

The complete investigative methodology for professional Person of Interest and Company of Interest investigations. From name variant analysis to Digital Unique Identifiers (name, email, phone, username, address) as core search terms, through leak databases, Dark Web intelligence, corporate registries, and AI-powered deep research.

The proven methodology from 35+ years of investigative practice: Investigate people and companies systematically – structured, repeatable, comprehensive

Our clients include leading technology companies, premium automotive manufacturers, Fortune 500 corporations, international gaming companies, and renowned fashion & sports brands

The Challenge: Complete POI Investigations Without Gaps

You know OSINT tools and have conducted initial research. But with complex Person of Interest investigations, you face challenges:

Time loss through unsystematic approaches.

Without a structured methodology, you search data sources randomly. You don't know which source comes next. The result: high time investment with no guarantee of completeness.

Missed connections and information.

You find individual details but no complete picture of the target person. Important cross-connections remain hidden because you don't know which Digital Unique Identifiers to search for systematically.

Uncertainty in differentiation.

Which information belongs to the target person, and which to people with the same name? Without a clear methodology for homonym analysis, you risk making false associations.

The solution: A reproducible methodology from 35+ years of practice.

This training gives you the complete, structured process: From the first name variant to the final Deep Research Report – step by step, with checklists, templates, and quality gates.

The Complete POI Investigation Methodology in 36 Chapters with 173 Lessons

Advanced OSINT Training teaches you the complete, structured methodology for Person of Interest and Company of Interest investigations. You don't just learn individual tools – you master the complete workflow, from preparation through systematic research across all relevant data sources to final analysis and reporting.

Structured Methodology

→ What this means for you:

Never investigate without a plan. Reproducible workflows for POI and COI investigations. Every step documented, every phase with a clear goal. From name analysis to deep research. You save time and increase your success rate.

Complete Coverage

→ What this means for you:

Nothing overlooked. Use all relevant data sources systematically: From corporate registries to social networks, leak databases, Dark Web intelligence, and media archives. You don't search randomly – you search strategically using Digital Unique Identifiers as search terms.

AI Integration

→ What this means for you:

Efficiency through intelligent automation. Deploy modern AI technology strategically: Generate name variants, analyze people with identical names, conduct deep research, create narratives. AI supports where it adds value – the expertise stays with you.

Professional Standards

→ What this means for you:

Legally sound, defensible results. Differentiation of people with identical names, structured documentation, source management, legally sound evidence preservation. Your investigation results withstand critical scrutiny.

→ What this means for you: Reproducible results in less time

With structured workflows, you conduct every investigation consistently. No important data source gets forgotten. You know exactly which step comes next.

10 Phases, 173 Lessons – Your Complete Investigation Methodology

The course follows the proven methodology from over 35 years of investigative practice at corma. 36 chapters, incl. 47 tool workshops. Structured, reproducible, professional.

PHASE 1:PREPARATION & FUNDAMENTALS (4 lessons)

The right start determines your investigation's success. In this phase, you learn how to prepare investigations legally, capture name variants systematically, differentiate people with identical names, and apply the Identity Framework – for a solid foundation without legal risks and confusion.

Module 1: Introduction to Person of Interest Investigations

Understand POI/COI/TOI investigation concepts, clarify legal frameworks, and document legitimate interest.

→ Legal certainty from the start – no legal risks

Module 2: Name Variant Analysis

Identify all possible spellings (foreign language, transcription, nicknames) and generate them using AI.

→ Higher hit rates in databases – you find what others miss

Module 3: Homonym Analysis

Systematically differentiate people with identical names and establish exclusion criteria.

→ No more false associations – clear differentiation prevents errors

Module 03a: Identity Framework

Systematic framework for identity verification and attribution of information to target persons.

→ Structured identity verification as the foundation of every investigation

PHASE 2:SYSTEMATIC DATA SOURCES (9 lessons)

The methodology's core: You learn how to use Digital Unique Identifiers (name, email, phone, username, address) as search terms to systematically search specialized data sources for information about the target person. This way, you cover all relevant sources completely – from leak databases to social networks to Dark Web intelligence.

Module 4: Corporate Registries

Identify holdings, positions, and connections in national and international registries.

→ Make business connections transparent

Module 5: Digital Unique Identifiers – The Core

Digital Unique Identifiers are SEARCH TERMS, not data sources. You use name, email, phone, username, and address as core search terms to systematically search specialized data sources for information about the target person.

5.1 Name as Search Term

Search in: People search engines, leak databases, OSINT platforms, Dark Web

→ Find all public and non-public mentions

5.2 Email as Search Term

Search in: Verification tools, reputation databases, leak data, account finders

→ Identify all linked accounts and data breaches

5.3 Username as Search Term

Search in: Username search engines, leak databases, pseudonym trackers

→ Track digital identities across platforms

5.4 Phone as Search Term

Search in: Carrier lookup, messengers, leak databases, Dark Web

→ Connect phone numbers to people and accounts

5.5 Address as Search Term

Search in: Leak databases, WHOIS data, location analysis tools

→ Identify physical locations and connections

→ What this means for you: No relevant information stays hidden

Module 6: Social Network Profiles

Systematic profile search, authenticity verification, and AI-powered information extraction.

→ The complete social media profile – relevant info and connections

Module 6a: POI-Owned Websites

Research current and historical website content via web archives.

→ Recover even deleted information

PHASE 3:ADVANCED RESEARCH (11 lessons)

Deeper insights through specialized sources: Search media archives, use Dark Web intelligence, query Telegram databases, systematically research images and documents, track crypto wallets and blockchain transactions, analyze stealer logs. You identify risks early, find visual evidence, and spot compliance-relevant information.

Module 7: Media & News

Search specialized media databases and capture key events chronologically.

→ Document the target person's public history

Module 8: Dark Web & Telegram

Use legitimate Dark Web intelligence platforms and Telegram database queries.

→ Identify risks early – without venturing into illegal areas

Module 9: Images & Documents

Facial recognition, reverse image search, and systematic document research.

→ Find visual evidence – even without name mentions

Module 10: Sanctions Lists

Systematically search international sanctions lists and PEP screening.

→ Identify compliance risks immediately

Module 11: Trademarks & Patents

Search intellectual property registries and link to business activities.

→ Make business interests transparent

Module 12: Search Engine Keywords

AI-powered keyword generation for comprehensive search (also works without AI).

→ Never miss anything through intelligent keyword combinations

Crypto & Blockchain

Identify wallet addresses, track blockchain transactions, and uncover crypto connections.

→ Trace financial flows via cryptocurrencies

Stealer Logs

Leverage compromised credentials from infostealer logs for investigations.

→ Uncover hidden accounts and access points

Metadata Analysis

Analyze EXIF data, document metadata, and hidden information in files.

→ Make hidden traces in files visible

GitHub & Code Repositories

Research developer profiles, code contributions, and technical traces in public repositories.

→ Identify technical identities and projects

SEO Tools for OSINT

Repurpose SEO analysis tools: uncover backlinks, traffic data, and website connections.

→ Discover website networks and hidden connections

PHASE 4:ANALYSIS & SYNTHESIS (6 lessons)

Individual information becomes a complete picture. You learn how to conduct deep research with AI support (or manually), overcome dead ends, apply intelligence methods, and create threat assessments. All puzzle pieces come together into complete profiles and coherent narratives.

Module 13: Deep Research Person

AI-powered background check and synthesis of all information (also works without AI).

→ The complete target person profile – all puzzle pieces fit together

Module 14: Deep Research Address

AI-powered analysis of physical environment and movement patterns (also works without AI).

→ Identify physical connections and patterns

Module 15: Deep Research Public Presence

AI-powered media research and reputation analysis (also works without AI).

→ Assess reputation and public perception

Overcoming Dead Ends

Strategies for investigation dead ends: alternative approaches, pivot techniques, and creative research paths.

→ When the trail goes cold, find new ways forward

Intelligence Methods

Apply structured analysis methods from intelligence practice.

→ Professional analysis frameworks for defensible results

Threat Assessment

Create structured threat evaluations and derive risk profiles.

→ Systematically assess threat potential

PHASE 5:PROFESSIONALIZATION & TOOLS (21 lessons)

Increase efficiency and quality: Deploy AI automation in all phases, create professional reports, select the right tools for your budget, optimally use registries, and develop complete Company of Interest profiles. Checklists ensure nothing gets overlooked.

Module 16: AI Support in All Phases

Use AI in preparation, research, analysis, and reporting.

→ More results in less time – AI handles time-consuming tasks

Module 17: Narratives & Reporting

AI-powered report creation with professional templates.

→ Professional reports without time investment

Module 18: Tool Overview & Cost Analysis

Compare specialized OSINT solutions and cost-benefit analysis.

→ The right tools for your budget – no expensive mistakes

Module 19: Public Registries (International)

Systematically use registries (corporate registries, business registries, property records).

→ Complete coverage in your jurisdiction

Module 20: POI Checklist

Comprehensive checklist for complete POI investigations and report templates.

→ Never forget anything – work systematically

Module 21: Company of Interest (COI) Deep Dive

Corporate forms, registries, financial databases, creditworthiness, leak data, and employee identification.

→ Create complete corporate profiles – systematically and comprehensively

PHASE 6:DARK WEB & CASE STUDIES (10 lessons)

In-depth Dark Web research and practical case studies: Understand the Tor network, use specialized search engines, and apply investigation methodology to real-world cases.

Tor Network & AccessDark Web Search EnginesNetworks & Forums4 Practical Case Studies
PHASE 7:NETWORK & INFRASTRUCTURE (9 lessons)

Technical infrastructure research: Systematically use domain analysis, WHOIS, DNS reconnaissance, IP geolocation, and scanning platforms for investigations.

Domain AnalysisWHOIS ResearchDNS ReconnaissanceIP GeolocationShodan & CensysWiFi Research
PHASE 8:REGIONS: RUSSIA & CHINA (8 lessons)

Specialized research in non-Western information spaces: RuNet sources, Russian databases, Chinese company research, and country-specific platforms.

RuNet & Russian SourcesRussian DatabasesChina Company ResearchCountry-Specific Platforms
PHASE 9:SOCMINT MASTERCLASS (43 lessons)

The comprehensive Social Media Intelligence Masterclass: Every relevant platform with dedicated lessons on profile analysis, data extraction, and platform-specific investigation techniques.

X / TwitterInstagramThreadsTikTokFacebookLinkedInTelegramDiscordSnapchatDating AppsFediverse / MastodonPinterest
PHASE 10:MONITORING (5 lessons)

Automate ongoing surveillance: RSS feeds, news alerts, website monitoring, and automated notifications for continuous investigation support.

RSS FeedsNews AlertsWebsite MonitoringAutomation
Included: OSINT Tools and Resources (26 chapters, 47 lessons)

The complete tool course is included in the Advanced OSINT Training. 47 practice-oriented lessons on the most important investigation tools, each with a hands-on workshop approach.

Hunchly WorkshopObsidian for InvestigatorsCyberChefPimEyesRegEx for OSINTBoolean Stringsi2 Analyst's NotebookMaltego EvidenceBellingcat Tools

and many more tool workshops

Note: Professional tools and platforms (data sources) are shown in detail in the course. Names remain reserved for course participants to protect our competitive advantage.

Who Is This Course For?

Recommended: OSINT Foundations Training or comparable prior knowledge

(secure research environment, browser setup, evidence preservation)

This course is designed for:

Investigators in law enforcement and customs agencies

Intelligence agency personnel

Prosecutors and attorneys

Investigative journalists and reporters

Private investigators and detectives

OSINT analysts in corporate security

Compliance officers and due diligence specialists

Brand protection managers

Threat intelligence analysts

Senior investigators

Anyone who wants to conduct professional POI investigations systematically and comprehensively

What's Included?

Advanced OSINT Training

€1,890 plus VAT

36 chapters, 173 lessons incl. Tools and Resources

Course Content

36 chapters with 173 practice-oriented lessons

Lifetime access to all course content

All future updates free of charge

Access via web browser, iOS, and Android app

Materials

Downloadable materials: Checklists, templates, workflows, AI prompts

Structured investigation templates for POI/COI research

Report templates for professional documentation

Support & Certificate

Certificate of completion upon finishing

Technical support for login and platform issues

Optional Add-Ons

Content-focused 1:1 coaching (additional fee)

Individual consulting for specific investigation cases

The Methodology from Daily Investigation Practice

Verified Customer Reviews
See what our customers say about our training programs.

Proven System from 35+ Years

→ What this means for you:

Battle-tested workflows. We use this methodology daily in real investigations. Every step is proven, every workflow optimized. You don't learn theory – you learn the practice that works at corma for Fortune 500 companies and government agencies.

Structured & Reproducible

→ What this means for you:

Consistent quality in every investigation. No more trial and error. You get a complete, structured process with checklists, templates, and quality gates for consistent results – whether you work alone or in a team.

AI Integration from Experts

→ What this means for you:

Efficiency without loss of control. We show how AI supports investigative work – without replacing it. From name variant generation to deep research reports. You remain the expert, AI is your tool.

What Our Participants Say

“I am a working OSINT analyst, I would strongly recommend the corma GmbH courses, specifically the Maltego training courses. Jörn is a Maltego SME, no doubt about that.”

OSINT Analyst, France

ProvenExpert Review, February 2023

“Very friendly and helpful contact. The online training is excellent and the content is outstanding. I highly recommend corma GmbH.”

Investigator, Law Enforcement Agency

ProvenExpert, August 2024

“Outstanding services from an experienced and competent expert team.”

Security Manager, Technology Corporation

ProvenExpert, January 2023

“The combination of years of practical experience with constantly evolving methodological competence impresses us time and again.”

Compliance Department, Energy Company

ProvenExpert, June 2020

Save even more?

Bundle with OSINT Foundations for just €3,000 net (instead of €3,380).

Frequently Asked Questions

Become an Expert in Systematic Person of Interest Investigations

Invest in a structured, reproducible methodology you can apply immediately in practice. With Advanced OSINT Training, you conduct Person of Interest (POI) and Company of Interest (COI) investigations that are complete, documented, and professional.

🚀

More results in less time

🔍

No more missed connections

⚖️

Legally sound, defensible investigations

📊

Professional reports that convince

All prices plus VAT. Lifetime access including all updates.