Open Source Intelligence Training (OSINT Singapore)


Open Source Intelligence Training (OSINT Singapore)

Osint Singapore
Osint Singapore

What’s In It For Me

  • Learn the trade secrets of how private investigators gather information online using Open Source Intelligence (OSINT Singapore) techniques 
  • Discover the tools and methods that professionals leverage on to get the direct contact information of a decision maker for pre-sales
  • Learn how to gather information legally for due diligence purposes
  • Utilize the skillsets taught to perform security testing and identifying external threats in your organization

Osint Singapore Course Overview

The course will provide you an in-depth knowledge of what Open Source Intelligence (Osint Singapore) is and how to leverage on publicly available information to gather information for various purposes. Trainees will learn the tools and methodologies on how to perform research discreetly while using covert accounts. 

Topics covered also include enhanced knowledge of utilizing social media, search engines, online databases and registries, and much more to achieve your data gathering objectives.  

The course will be conducted using lecture slides, pop quizzes, case studies and live step-by-step walk-through of certain software tools and methodologies that you can practice immediately after the training. You will be awarded a Certificate of Completion upon successful course completion.

Who Should Attend This Osint Singapore Course
The suitable students for this programme are likely to be:

  • Private Investigators (PI) who want to enhance their data gathering skill sets  
  • Sales and Pre-sales professionals to better identify and connect to the relevant decision maker 
  • Poly and University Students who want to improve their research skills
  • Compliance officers to perform due diligence on any individual or business entity 
  • Security professionals to improve their Ethical Hacking and Penetration Testing services

Osint Singapore Course Objectives

  • Competent Private Investigators (PI) with excellent data gathering skills
  • Compliance officers to learn the fundamentals of due diligence methodologies and techniques
  • Security or IT professionals to be able to identify potential weaknesses in friendly networks
  • Sales personnel to learn how to cut through the red tape and connect directly to their intended audience
  • Perform research on any individual or entity for any legal purposes

Osint Singapore Course Breakdown (Click on each module to expand topic coverage)

  • OSINT Introduction
  • OSINT Search Tool
  • OSINT Search Tool II
  • OSINT Singapore Search Tool III
  • Private Web Forum
  • VPN Usage
  • Buscador Introduction
  • Buscador VirtualBox
  • Buscador VMWare
  • Buscador Updates
  • Buscador App Updates
  • Buscador Browsers
  • Buscador Video Download
  • Buscador Video Utilities
  • Buscador Twitter
  • Buscador Twint
  • Buscador Instalooter
  • Buscador Instaloader
  • Buscador Metadata
  • Buscador SkipTracer
  • Buscador Domains
  • Custom Virtual Machine
  • Windows Virtual Machine
  • Search Introduction
  • Search Operators
  • Google Options
  • Bing Options
  • Alternative Engines
  • International Search
  • Newsgroups
  • Online News
  • Newspaper Archive
  • 10 FTP Search
  • Search Alerts
  • Google Update
  • Custom Engines
  • Google Date
  • Dark Web
  • Dark Web II
  • Wayback Search
  • Covert Account Creation
  • Covert Account Update
  • Covert Facebook Update
  • Introduction
  • Facebook 1
  • Facebook 2
  • Facebook 3
  • Facebook 4
  • Twitter 01
  • Twitter 02
  • Twitter 03
  • Twitter 04
  • Instagram
  • SN Update
  • Google Maps
  • Bing Maps
  • Maps Tools
  • Mapping Update I
  • Mapping Update II
  • Photos Search
  • Reverse Search I
  • Reverse Search II
  • Twitter Images
  • Photo Metadata
  • Photo Manipulation
  • Cached Data
  • Website Archives I
  • Website Archives II
  • People Search I
  • Voter Records
  • Voter Records II
  • Government Records
  • International Search
  • Gift Registries
  • Source Code
  • Shared Documents
  • Document Search I
  • Document Search II
  • Leaked Documents
  • Document Search Tool
  • LinkedIn
  • LinkedIn Email Search
  • Resumes
  • Business Records
  • Facebook Ads
  • eBay
  • Craigslist
  • Classifieds
  • School Alumni
  • Dating Sites
  • Tinder I
  • Tinder II
  • Reddit I
  • Reddit II
  • TikTok
  • Criminal Markets I
  • Criminal Markets II
  • Darknet Investigations
  • Virtual Currencies I
  • Virtual Currencies Tool
  • Email Search
  • Email Search II
  • User Names I
  • User Names II
  • Email/User Leaks
  • Email/User Leaks II
  • Email/User Leaks III
  • Email/User Leaks IV
  • Email/User Leaks V
  • Email/User Leaks VI
  • Email Search III
  • Email Search IV
  • Email Investigation Webinar
  • Telephone Search
  • Telephone Update
  • Videos Search
  • YouTube I
  • YouTube II
  • YouTube Deleted Content
  • Reverse Video Search
  • Domains
  • IP Addresses
  • Shodan & Wigle
  • SSID Tool
  • Domain / IP II
  • Domain / IP III
  • Domain / IP IV
  • Domain / IP V
  • URL Shorteners
  • Forums
  • Vital Records
  • Professional Records
  • Vehicle Records
  • API Introduction
  • Full Contact
  • Caller ID I
  • Caller ID II
  • Flickr API
  • Windows Introduction
  • Firefox I
  • Firefox II
  • Firefox III
  • Firefox IV
  • Browser Scripts
  • Firefox Containers
  • Tor Browser
  • Screen Capture
  • HTTrack
  • Video Extract
  • Video Player
  • Video Converter
  • Video Eliminator
  • Audio Extract
  • Video Downloader
  • Video Metadata
  • Google Earth
  • Exif Tool
  • SubBrute
  • IP/Domain Info
  • Twitter Export
  • OS Forensics
  • Recuva
  • Creepy
  • InstagramDL
  • ForeVid
  • CCleaner/BleachBit
  • Mac Introduction
  • Mac Web Browser
  • Video Downloader
  • Video Utilities
  • Instagram Download
  • Screen Capture
  • Android Emulation Intro
  • Android Emulation I
  • Android Emulation II
  • Android Emulation III
  • Android Emulation IV
  • Android Emulation V
  • Caller ID Spoofing
  • Google Voice
  • IP Logger I
  • IP Logger II
  • Frequency Monitoring
  • Email Assumptions
  • Avoiding Analytics
  • OSINT Flowcharts
  • Documentation Techniques
  • Download Tools
  • Tab Management
  • Event Monitoring
  • 5 Hunchly
  • LinkedIn Data
  • Consumer Data
  • SpecialK Spam Data
  • Usenet Archive I
  • Usenet Archive II
  • Usenet Archive III
  • Elastic Search Databases
  • Elastic Search Databases II
  • Advanced Introduction
  • 2 Buscador Recon-ng
  • 3 Web Scraping I
  • 4 Web Scraping II

Trainer Profile

Andy Prakash co-founded, Singapore’s first bug bounty platform, working with the top community of white hat hackers to identify and report vulnerabilities in businesses’ websites, mobile applications and systems.

As the Chief Information Officer, he has given speeches and conducted masterclasses for ACE startups, co-working spaces, Echelon by e27 (2019), Chamber of Commerce and even Interpol 2019.

He has since exited the cybersecurity startup for an undisclosed sum and now focuses on Data Privacy Consultancy and PDPA training. He is the designated DPO for numerous companies in Singapore and handles Data Privacy matters on a day to day basis. 

He has also been featured on numerous media outlets like Channel News Asia, Channel 8 and Berita Harian, on cyber security and its various associated topics.


Dexter Ng is an experienced professional in the field of IT and Cybersecurity. He is the Founder of Antihack.Me and CTO of Privacy Ninja. He has more than 10+ years working with start-up companies with leading edge ideas and technologies; technical development, business consulting, project management and data protection. He created the first cybersecurity insurance bundle together with Data Protection Solution in Singapore. He is also a cybersecurity and Data Protection speaker at Google Event, Singapore’s Government SMART NATION Event, CEBIT 2018, Mindef Maritime defence, Echelon (e27) and many more. He has been featured on Channel News Asia, MoneyFM 89.3 Radio, Business Times, Straits Times, AsiaOne , Newpaper, Edge magazine and also Hardwarezone Magazine on cybersecurity. He was featured in a Channel News Asia cybersecurity documentary recently.

Some key clients: Temasek Club, NETS, SPIZE,, Club21, Starhub, NTUC (Nebo), Health Promotional Board, Marlboro, Gelato Ice Cream, Bali Thai, Katrina Holdings, Hotel 81, Vhotel.


Contact our sales team

Drop us your details and our sales Ninjas will get in touch in 24 hours


Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection
× How can we help you?