Why you need this course

X (formerly Twitter) remains one of the most time-sensitive, intelligence-rich platforms for investigations, yet it is also one of the easiest to misuse or search incorrectly. Without a structured understanding of how X works, investigators risk missing critical context, misreading timelines, overlooking unique identifiers, or losing evidence to deletion, suspension, or platform changes.

This course gives students a repeatable, investigator-focused methodology for using X effectively teaching not just what to search, but why, how, and when to search on-platform versus off-platform.

By learning account profiling, operator usage, timeline validation, evidence preservation, and advanced search techniques, students gain the abilities to turn raw social media content into intelligence that supports real-world fraud, threat, cyber crime, and situational-awareness investigations.

Key learning objectives

  • Analyze and validate X accounts and timelines
    • Students will be able to profile X accounts, identify unique user identifiers, and accurately validate account creation dates and activity timelines for investigative use.
  • Apply effective search strategies to uncover relevant intelligence
    • Students will be able to use on-platform and off-platform search techniques, operators, and advanced search tools to locate users, conversations, media, and historical content efficiently.
  • Preserve and document X-based evidence
    • Students will be able to capture, download, and preserve posts and media in a manner that supports investigations, reporting, and evidentiary integrity.


At the end of the course, you will

  • Be able to quickly profile, index, and validate X accounts and content confirming identity indicators, timelines, and behavioral patterns for investigative use.
  • Leverage on-platform and off-platform searches, operators, and advanced tools to efficiently surface relevant users, conversations, media, and historical content.
  • Identify, collect, and preserve high-risk content (videos, posts, metadata) before deletion or suspension, ensuring intelligence and evidence remain usable and defensible.

Frequently Asked Questions

  • This course has 73 minutes of instruction.

  • Earn 1 CPE/CEU for completing this course.

  • Tony Lisek authored and teaches the course.

  • This course consists of online videos accessible from mobile app and/or web browser. Lecture, demonstration, and hands-on exercises.

  • This course is included in the All OSINT Course bundles.

  • A course completion certificate is automatically provided to students finishing this course.

  • To successfully complete this course, you must have access to the internet and a modern web browser.

  • A research account (sock puppet) on the X platform is required to complete some of the activities in this course.