Welcome to CQCore Solutions

Empower & Innovate


At CQCore Solutions we offer Continuous Professional Development Events, Training and Consultancy Services.

Empower and Innovate at both a practitioner and senior level. Fill knowledge or experience gaps.


We have a Specialist Exfiltrated Data OSINT Event planned for:-

Monday 16th March 2026 - Pateley Suite - The Queens Hotel - Leeds - LS1 1PJ

click here

Online & Digital Exposure Risks: -

Understanding Online and Digital exposure risks. Aimed at all audiences but maybe especially of interest to those who may consider themselves to be in a position that may make them a target. Business Leaders, Police Leaders and Leaders within Government are a few examples.


Privacy Fundamentals: -

Review and revise how you use modern technology such as mobile phones or email. Learn how to protect your data and privacy. Understand that free products are not necessarily free and that anonymous is not necessarily anonymous. This will likely be the first time you have received any training on the use of modern technology.


Introduction to OSINT: -

Aims & Objectives, Polices & Procedures, Capturing Evidence, Operational Security (OPSEC), Privacy and Report Writing.


OSINT Essentials: -

People Research, Social Media OSINT, Geolocation OSINT Image OSINT, Business Research OSINT, Email & Username OSINT.


Advanced OSINT: -

Data OSINT, Telegram OSINT, Internet OSINT, Dark-Web & Forum OSINT and Website OSINT. Pseudonym Creation, URL Manipulation, OSINT Virtual Environment Workspaces.


Exfiltrated Data: -

OSINT / Cyber Threat Intelligence relating to Exfiltrated Data, more commonly referred to as Breached Data. This training is aimed at experienced OSINT professionals or those who which to advance their knowledge.


OSINT at a Leadership Level: -

Understand what is required at a Leadership Level to implement an OSINT capability within an Organisation or Business.

It is essential to professionalise processes and understand the importance's of an investigative mindset, methodology, provenance, validation, verification and any vulnerabilities that impact you or your organisation.