Advanced OSINT Training – Systematic Person of Interest & Company of Interest Investigations

The complete investigative methodology for professional Person of Interest and Company of Interest investigations. From name variant analysis to Digital Unique Identifiers (name, email, phone, username, address) as core search terms, through leak databases, Dark Web intelligence, corporate registries, and AI-powered deep research.

The proven methodology from 35+ years of investigative practice: Investigate people and companies systematically – structured, repeatable, comprehensive

Our clients include leading technology companies, premium automotive manufacturers, Fortune 500 corporations, international gaming companies, and renowned fashion & sports brands

The Challenge: Complete POI Investigations Without Gaps

You know OSINT tools and have conducted initial research. But with complex Person of Interest investigations, you face challenges:

Time loss through unsystematic approaches.

Without a structured methodology, you search data sources randomly. You don't know which source comes next. The result: high time investment with no guarantee of completeness.

Missed connections and information.

You find individual details but no complete picture of the target person. Important cross-connections remain hidden because you don't know which Digital Unique Identifiers to search for systematically.

Uncertainty in differentiation.

Which information belongs to the target person, and which to people with the same name? Without a clear methodology for homonym analysis, you risk making false associations.

The solution: A reproducible methodology from 35+ years of practice.

This training gives you the complete, structured process: From the first name variant to the final Deep Research Report – step by step, with checklists, templates, and quality gates.

The Complete POI Investigation Methodology in 21 Modules

Advanced OSINT Training teaches you the complete, structured methodology for Person of Interest and Company of Interest investigations. You don't just learn individual tools – you master the complete workflow, from preparation through systematic research across all relevant data sources to final analysis and reporting.

Structured Methodology

β†’ What this means for you:

Never investigate without a plan. Reproducible workflows for POI and COI investigations. Every step documented, every phase with a clear goal. From name analysis to deep research. You save time and increase your success rate.

Complete Coverage

β†’ What this means for you:

Nothing overlooked. Use all relevant data sources systematically: From corporate registries to social networks, leak databases, Dark Web intelligence, and media archives. You don't search randomly – you search strategically using Digital Unique Identifiers as search terms.

AI Integration

β†’ What this means for you:

Efficiency through intelligent automation. Deploy modern AI technology strategically: Generate name variants, analyze people with identical names, conduct deep research, create narratives. AI supports where it adds value – the expertise stays with you.

Professional Standards

β†’ What this means for you:

Legally sound, defensible results. Differentiation of people with identical names, structured documentation, source management, legally sound evidence preservation. Your investigation results withstand critical scrutiny.

β†’ What this means for you: Reproducible results in less time

With structured workflows, you conduct every investigation consistently. No important data source gets forgotten. You know exactly which step comes next.

21 Modules in 5 Phases – Your Complete Investigation Methodology

The course follows the proven methodology from over 35 years of investigative practice at corma. Structured, reproducible, professional.

PHASE 1:PREPARATION & FUNDAMENTALS

The right start determines your investigation's success. In this phase, you learn how to prepare investigations legally, capture name variants systematically, and differentiate people with identical names – for a solid foundation without legal risks and confusion.

Module 1: Introduction to Person of Interest Investigations

Understand POI/COI/TOI investigation concepts, clarify legal frameworks, and document legitimate interest.

β†’ Legal certainty from the start – no legal risks

Module 2: Name Variant Analysis

Identify all possible spellings (foreign language, transcription, nicknames) and generate them using AI.

β†’ Higher hit rates in databases – you find what others miss

Module 3: Homonym Analysis

Systematically differentiate people with identical names and establish exclusion criteria.

β†’ No more false associations – clear differentiation prevents errors

⭐ PHASE 2:SYSTEMATIC DATA SOURCES

The methodology's core: You learn how to use Digital Unique Identifiers (name, email, phone, username, address) as search terms to systematically search specialized data sources for information about the target person. This way, you cover all relevant sources completely – from leak databases to social networks to Dark Web intelligence.

Module 4: Corporate Registries

Identify holdings, positions, and connections in national and international registries.

β†’ Make business connections transparent

⭐

Module 5: Digital Unique Identifiers – The Core

Digital Unique Identifiers are SEARCH TERMS, not data sources. You use name, email, phone, username, and address as core search terms to systematically search specialized data sources for information about the target person.

5.1 Name as Search Term

Search in: People search engines, leak databases, OSINT platforms, Dark Web

β†’ Find all public and non-public mentions

5.2 Email as Search Term

Search in: Verification tools, reputation databases, leak data, account finders

β†’ Identify all linked accounts and data breaches

5.3 Username as Search Term

Search in: Username search engines, leak databases, pseudonym trackers

β†’ Track digital identities across platforms

5.4 Phone as Search Term

Search in: Carrier lookup, messengers, leak databases, Dark Web

β†’ Connect phone numbers to people and accounts

5.5 Address as Search Term

Search in: Leak databases, WHOIS data, location analysis tools

β†’ Identify physical locations and connections

β†’ What this means for you: No relevant information stays hidden

Module 6: Social Network Profiles

Systematic profile search, authenticity verification, and AI-powered information extraction.

β†’ The complete social media profile – relevant info and connections

Module 6a: POI-Owned Websites

Research current and historical website content via web archives.

β†’ Recover even deleted information

PHASE 3:ADVANCED RESEARCH

Deeper insights through specialized sources: Search media archives, use Dark Web intelligence, query Telegram databases, systematically research images and documents. You identify risks early, find visual evidence, and spot compliance-relevant information like sanctions lists or patents.

Module 7: Media & News

Search specialized media databases and capture key events chronologically.

β†’ Document the target person's public history

Module 8: Dark Web & Telegram

Use legitimate Dark Web intelligence platforms and Telegram database queries.

β†’ Identify risks early – without venturing into illegal areas

Module 9: Images, Videos & Documents

Facial recognition, reverse image search, and systematic document research.

β†’ Find visual evidence – even without name mentions

Module 10: Sanctions Lists

Systematically search international sanctions lists and PEP screening.

β†’ Identify compliance risks immediately

Module 11: Trademarks & Patents

Search intellectual property registries and link to business activities.

β†’ Make business interests transparent

Module 12: Search Engine Keywords

AI-powered keyword generation for comprehensive search (also works without AI).

β†’ Never miss anything through intelligent keyword combinations

PHASE 4:ANALYSIS & SYNTHESIS

Individual information becomes a complete picture. You learn how to conduct deep research on person, address, and public presence with AI support (or manually). All puzzle pieces come together into complete profiles and coherent narratives.

Module 13: Deep Research Person

AI-powered background check and synthesis of all information (also works without AI).

β†’ The complete target person profile – all puzzle pieces fit together

Module 14: Deep Research Address

AI-powered analysis of physical environment and movement patterns (also works without AI).

β†’ Identify physical connections and patterns

Module 15: Deep Research Public Presence

AI-powered media research and reputation analysis (also works without AI).

β†’ Assess reputation and public perception

PHASE 5:PROFESSIONALIZATION & TOOLS

Increase efficiency and quality: Deploy AI automation in all phases, create professional reports, select the right tools for your budget, optimally use registries, and develop complete Company of Interest profiles. Checklists ensure nothing gets overlooked.

Module 16: AI Support in All Phases

Use AI in preparation, research, analysis, and reporting.

β†’ More results in less time – AI handles time-consuming tasks

Module 17: Narratives & Reporting

AI-powered report creation with professional templates.

β†’ Professional reports without time investment

Module 18: Tool Overview & Cost Analysis

Compare specialized OSINT solutions and cost-benefit analysis.

β†’ The right tools for your budget – no expensive mistakes

Module 19: Public Registries (International)

Systematically use registries (corporate registries, business registries, property records).

β†’ Complete coverage in your jurisdiction

Module 20: POI Checklist

Comprehensive checklist for complete POI investigations and report templates.

β†’ Never forget anything – work systematically

Module 21: Company of Interest (COI) Deep Dive

Corporate forms, registries, financial databases, creditworthiness, leak data, and employee identification.

β†’ Create complete corporate profiles – systematically and comprehensively

Note: Professional tools and platforms (data sources) are shown in detail in the course. Names remain reserved for course participants to protect our competitive advantage.

Who Is This Course For?

Recommended: OSINT Foundations Training or comparable prior knowledge

(secure research environment, browser setup, evidence preservation)

This course is designed for:

Investigators in law enforcement and customs agencies

Intelligence agency personnel

Prosecutors and attorneys

Investigative journalists and reporters

Private investigators and detectives

OSINT analysts in corporate security

Compliance officers and due diligence specialists

Brand protection managers

Threat intelligence analysts

Senior investigators

Anyone who wants to conduct professional POI investigations systematically and comprehensively

What's Included?

Advanced OSINT Training

€1,190 incl. VAT

(€1,000 net)

Course Content

21 comprehensive modules with numerous training videos

Lifetime access to all course content

All future updates and new videos at no charge

Access via web browser, iOS, and Android app

Materials

Downloadable materials: Checklists, templates, workflows, AI prompts

Structured investigation templates for POI/COI research

Report templates for professional documentation

Support & Certificate

Certificate of completion upon finishing

Technical support for login and platform issues

Optional Add-Ons

Content-focused 1:1 coaching (additional fee)

Individual consulting for specific investigation cases

The Methodology from Daily Investigation Practice

Verified Customer Reviews
See what our customers say about our training programs.

Proven System from 35+ Years

β†’ What this means for you:

Battle-tested workflows. We use this methodology daily in real investigations. Every step is proven, every workflow optimized. You don't learn theory – you learn the practice that works at corma for Fortune 500 companies and government agencies.

Structured & Reproducible

β†’ What this means for you:

Consistent quality in every investigation. No more trial and error. You get a complete, structured process with checklists, templates, and quality gates for consistent results – whether you work alone or in a team.

AI Integration from Experts

β†’ What this means for you:

Efficiency without loss of control. We show how AI supports investigative work – without replacing it. From name variant generation to deep research reports. You remain the expert, AI is your tool.

What Our Participants Say

β€œI am a working OSINT analyst, I would strongly recommend the corma GmbH courses, specifically the Maltego training courses. JΓΆrn is a Maltego SME, no doubt about that.”

OSINT Analyst, France

ProvenExpert Review, February 2023

β€œVery friendly and helpful contact. The online training is excellent and the content is outstanding. I highly recommend corma GmbH.”

Investigator, Law Enforcement Agency

ProvenExpert, August 2024

β€œOutstanding services from an experienced and competent expert team.”

Security Manager, Technology Corporation

ProvenExpert, January 2023

β€œThe combination of years of practical experience with constantly evolving methodological competence impresses us time and again.”

Compliance Department, Energy Company

ProvenExpert, June 2020

Frequently Asked Questions

Become an Expert in Systematic Person of Interest Investigations

Invest in a structured, reproducible methodology you can apply immediately in practice. With Advanced OSINT Training, you conduct Person of Interest (POI) and Company of Interest (COI) investigations that are complete, documented, and professional.

πŸš€

More results in less time

πŸ”

No more missed connections

βš–οΈ

Legally sound, defensible investigations

πŸ“Š

Professional reports that convince

All prices include tax. Lifetime access as long as the product is offered.