This is the go-to course for learning how to start investigating China’s internet.
You’ll build the foundation needed to search, collect, and analyze Chinese data sources.
You’ll learn how to:
Essentials gives you the foundation every investigator needs before moving to professional-level training.
This is where you start right — with the practical basics that make advanced work possible.
* No prerequisite required — you can take this course on its own or move straight to Advanced/Master.
Includes 1 bonus publication from Dark Web Advanced: Source Development — a mini intelligence gift designed to help you combine methods from both trainings.
With this, you’ll learn how to merge Essential China OSINT skills with dark web source development techniques, unlocking entirely new ways to discover and connect hidden data.
Our team supports you throughout your 60-day learning journey of Searching China
We answer all questions via email and encourage active communication
China’s internet isn’t just censored — it’s layered with restrictions. From apps limiting downloads and installs, to GEO-based blocks that defeat most VPNs, and captchas that Westerns can't solve.
One unique restriction? Platforms like CSDN that block full content unless you’re logged in (using a +86).
In this video, we show you exactly how to bypass that — and access the full content without needing an account. Step by step.
In this brief 12 minute sneak peek with you so you can get a good idea of how detailed and comprehensive our new updated October 2024 video lessons are, these are called 'investigative sessions' where you get an inside view into the step by step, how we explore, how we search, how we find information and pivot from it in China's complex ecosystem. How do we search or go from incorrect searching to the right one in Chinese as a Western investigator, to not waste time, be accurate ...
In this video, we demonstrate—live—how to bypass platforms like QCC.com and Tianyancha, China’s leading corporate intelligence sites. These sites often block access using DPI (Deep Packet Inspection) or geo-restrictions, making simple tools like VPNs useless. We show you exactly how to get around those blocks effectively.
In the course, we teach you at least four unique access methods (and more in development)— including techniques rarely used by OSINT professionals. Why? Because these methods are adapted directly from advanced penetration testing practices, giving you solutions that go far beyond traditional open-source workflows.
In this video, we demonstrate how to convert any image hosted on Weibo servers into a user ID (UID) — effectively identifying the person who posted it. In our SOCMINT section, we also deep dive into full QQ, WeChat OSINT — covering everything from bypassing restrictions and creating accounts to gaining access and conducting effective investigations.
How does this course align with your career goals?
What is the process of joining this course?
If I am a company, how do I buy for our employee?
If you have any questions to which the answer to is not available on our site, kindly send us an email to team@epcyber.com and we will gladly address all questions you have.
Copyright © 2025 All Rights Reserved.
Main Office: Europe
Second Office: U.S Miami Florida
Email (payments, access, support, verifications, questions) team@epcyber.com
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.