Cibergy OSINT

Certified Dark Intelligence Analyst - English Edition 🇬🇧

Become an expert in the dark web and cybercrime investigation. Elevate your investigations and advance your professional career.

  • 347 € o 2 pagos mensuales de 178 €

Ready to master Dark Web investigations?

  • Curso online

We present the Certified Intelligence Analyst (CDIA) Program – English Edition 🇬🇧

This course is 100% online and self-paced, featuring more than 12 hours of recorded content distributed across 7 modules (plus additional bonus material).

You will receive lifetime access to the content, allowing you to revisit it anytime you wish.

Certified Intelligence Analyst (CDIA) Program – English Edition 🇬🇧

Program Content

Become an expert in Dark Web investigations.

Certified Dark Intelligence Analyst (CDIA) – The Complete Ebook

CDIA - Ebook.pdf
DarkWeb Forums & Marketplaces Playbook.pdf

DARKINT Course - Slides

Module 0 - Fundamentals of Cybercrime.pdf
Module 1 - Introduction to the Underground Ecosystem.pdf
Module 2 - Access and Infiltration.pdf
Module 3 - Anonymization Networks.pdf
Module 4 - Non-Conventional Information Sources.pdf
Module 5 - Advanced Investigations and OSINT Techniques.pdf
Module 6 - Emerging Trends and the Future of Digital Research.pdf

Module 0 - Fundamentals of Cybercrime

Module 0 - Fundamentals of Cybercrime.pdf
Module 0.1 - Global Overview of Cybercrime
Module 0.2 – Crimeware as a Service (CaaS)
Module 0.3 - Ransomware-as-a-Service (RaaS)
Module 0.4 – Classification of Cybercriminals
Module 0.5 – Crypto Asset Laundering
Module 0.6 – Cybercrime Taxonomy and Typology
Module 0.7 – Case Study of Cyberbullying (Amanda Todd)
Module 0.8 - Cyber Kill Chain
Module 0.9 – Introduction to the MITRE ATT&CK Framework

Module 1 – Introduction to the Underground Ecosystem

Module 1 - Introduction to the Underground Ecosystem.pdf
Module 1.1 – Demystifying the ‘Deep Web
Module 1.2 – What Is the TOR Network?
Module 1.3 – TOR Browser Configuration
Module 1.4 – TOR Pages and Websites
Module 1.5 - Deep Web vs Dark Web
Module 1.6 – Underground Forums and Communities
Module 1.7 – Introduction to Telegram and Discord
Module 1.8 – Russian and Chinese Forums: Historical Epicenters
Module 1.9 – Persistence vs. Volatility
Module 1.10 – Resilience Strategies
Module 1.11 – The Dark Web as a Social Mirror

Module 2 – Access and Infiltration Methodologies

Module 2 – Methods of Access and Infiltration.pdf
Module 2.1 – Access Levels and Hierarchies
Module 2.2 – Introduction to Covert Accounts
Module 2.3 – Tools for Identity Creation
Module 2.4 – Identity Maintenance
Module 2.5 – Advanced Anonymization Tools
Module 2.6 – Ethical Infiltration Techniques
Module 2.7 – Ethical Boundaries and Responsibilities
Module 2.8 – The Psychological Factor of Infiltration
Module 2.9 – The Danger of Burn

Module 3 – Anonymization Networks: From TOR to the Deepest Layers

Module 3 – Anonymization Networks.pdf
Module 3.1 – The TOR Network
Module 3.2 – Theoretical and Practical Weaknesses of TOR
Module 3.3 – Beyond the TOR Browser
Module 3.4 – The Myth of the Dark Web
Module 3.5 – Investigation Tools for TOR
Module 3.6 – Practical Example of Investigation on TOR
Module 3.7 – Introduction to I2P
Module 3.8 – Philosophy of I2P
Module 3.9 – I2P Installation
Module 3.10 – Modern Criminal Activity on I2P
Module 3.11 – Alternative and Niche Networks of Cybercrime

Module 4 – Non-Conventional Information Sources

Module 4 - Non-Conventional Information Sources.pdf
Module 4.1 – Anatomy of Underground Forums
Module 4.2 – Source Evaluation in Underground Environments
Module 4.3 – Telegram: The New Criminal Hub
Module 4.4 – Other Key Apps
Module 4.5 – The Fediverse: Mastodon and Alternative Networks
Module 4.6 – IRC: The Persistence of the Ancestral
Module 4.7 - Leaks and Data Breaches
Module 4.8 – Advanced Investigation Tools
Module 4.9 – Advanced Investigation Tools 2
Module 4.10 – Leak Investigation Tools

Module 5 – Advanced Investigation Techniques and OSINT

Module 5 – Advanced Investigation Techniques and OSINT.pdf
Module 5.1 – Introduction to OSINT Tools
Module 5.2 – Automated Monitoring Tools
Module 5.3 – Identity Correlation
Module 5.4 – Critical Errors in Attribution Processes
Module 5.5 – Metadata Forensic Analysis
Module 5.6 – Forensic Linguistics
Module 5.7 – Verification in Disinformation Ecosystems
Module 5.8 – Navigating GoldenOwl

Module 6 – Emerging Trends and the Future of Digital Investigation

Module 6 – Emerging Trends and the Future of Digital Investigation.pdf
Module 6.1 – A Digital Ecosystem in Transformation
Module 6.2 – Artificial Intelligence in Cybercrime
Module 6.3 – Artificial Intelligence in Malware Generation
Module 6.4 – Artificial Intelligence in Disinformation and Manipulation
Module 6.5 – Evolution of the Threat Landscape
Module 6.6 – The Imperative of Continuous Training

BONUS LESSONS - Dark Web Toolkit

Bonus Tool #1
Bonus Tool #2
Bonus Tool #3
Bonus Tool #5
Bonus Tool #4
Bonus Tool #6

Access to expert instructors who will be available to answer your questions.

Faculty

Ainoa Guillén

CTI Manager at Accenture

Ainoa Guillén is a criminologist and cybersecurity specialist with more than 8 years of experience in Cyber Threat Intelligence (CTI) and the analysis of cybercriminal groups. She is an expert in dark web investigations and the application of advanced OSINT techniques.

What do students say about our courses?

Marta Gozalo

Criminology Student

"As a criminology student, taking this OSINT course has been a great decision. I now have advanced investigative skills that will certainly impact my future professional career."

Adrián

Intelligence Analyst

"I found the course very comprehensive. I especially liked that it covered tools for both individuals and companies. The OPSEC module was excellent as well. I appreciated how thoroughly the topic was addressed, and the methods taught felt very practical and realistic."

Bram Jeremias

Security and Risk Prevention Student

“The interactive OSINT lessons sparked my interest and significantly expanded my knowledge as a security student. Thank you for such an engaging and educational experience!”

Horacio Martín

Aviation Industry Professional

"The course is very good and engaging, especially for those of us who already have some knowledge of the topic but need to better structure our understanding."

Nikauri Illeana

Security and Risk Prevention Student

"Before taking this course, I wasn’t familiar with OSINT. The course was inspiring, engaging, and innovative. I highly recommend taking it."

Frances de Visser

Security and Risk Prevention Student

"Very interesting OSINT lessons. I’ve learned a lot! Investigations on social media, the dark web, Maltego, everything was new to me. Thank you very much!"

We Answer Your Questions 👇🏻

Who is this course for?

Our course is designed so that anyone, regardless of their technical background, can learn how to investigate the dark web in a professional, structured, and secure way, progressing from fundamental concepts to advanced techniques.

It is designed for both beginners and cybersecurity professionals who want to develop or strengthen their DARKINT capabilities.

How long does the DARKINT course last?

The course includes 12 hours of recorded training, with full flexibility so participants can learn at their own pace.

You will receive an official certificate upon completion.

What type of content will I receive?

The program includes: 7 recorded modules, a detailed DARKINT ebook, 3 complementary live sessions, an official certificate upon completion, and many additional resources.

How long will I have access?

Access to the course is unlimited from the start date.

You will also be able to download all associated materials during this time, including presentations, documents, and other resources.

Is €347 too expensive?

No. Accessing a complete DARKINT program at this price is a great opportunity.

Will the price increase in the future?

Yes. We are continuously preparing much more content to make the program even more valuable. Those who join now will be rewarded for their early trust: they will keep their price in the future and receive additional bonuses and updates.

I Want to Access the Program

Boost your professional career and become a Certified Dark Intelligence Analyst (CDIA).