Advanced Open Source Intelligence (OSINT) for Defence and Security Investigation

Overview

Building on the foundations taught at the OSINT Masterclass, this class will teach some more advanced techniques for harvesting information and turning it into OSINT.  Leveraging the foundation skills delegates will learn to Google-dork and fusk their way to discovering information that won’t appear in normal search engine results.  This class will also introduce techniques to access the dark web and OSINT software that can assist in automating some of your internet research.  This is a hands-on course and it is interspersed with plenty of practical exercises to reinforce the learning points.

What you will learn from this Masterclass:

  • APPLY knowledge of server storage and web spider technologies to DISCOVER information not readily available to a search engine.
  • LEARN how to use automate repetitive tasks and deliver results.
  • STRENGTHEN your search engine’s performance.
  • MASTER new and faster ways to conduct internet research.
  • MAKE the most of open source information research tools to locate, filter, and collect information and data more efficiently and effectively,
  • PRACTICE a safe, secure and anonymous techniques when conducting research.
  • IMPLEMENT a streamlined approach when conducting OSINT to ensure the outputs address the specific needs of the intended audience.
Who will attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Counter Intelligence Investigators
  • Cybercrime Intelligence Officers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Expert Trainer completed 23 years in the British Army Intelligence Corps working in various fields including Counter Intelligence, Technical Investigations, Information Assurance, HUMINT IMINT and Cyber Security.

He developed an OSINT course to train other investigators and intelligence analysts in researching using the internet and doing it safely and anonymously.  Expert Trainer   has worked in mainland Europe, the Middle East and West Africa and currently teaches OSINT techniques to military staff across the 27 NATO nations and defence industry partners.

Case Studies

Class exercises/ Case studies:

Case studies and exercise will be used throughout the course to reinforce learning points and the course culminates in a consolidation exercise on a real world scenario. 

NOTE: Laptop required

  • Google Chrome and/or Firefox
  • Google Earth Pro
  • TOR Browser Bundle
  • Geo Creepy
  • Maltego
  • Notepad++

Links to the download sites will be supplied with the course joining details.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Counter Improvised Explosive Devices (C-IED) in Today’s Terror Threat Environment

Overview

This 2-day workshop and training is designed to equip delegates to gain a strategic understanding on IED’s, IED attacks and how to firstly prevent and minimise risk of attack and secondly to help deal with an attack should the worse happen. The workshop will also explore methods of information gathering and the importance of information sharing and reporting when attacks occur.

What you will learn from this workshop: 

  • IDENTIFY technologies involved in C-IED and methods of employment.
  • UNDERSTAND the key C-IED activities of, predict, pursue, prevent, detect, neutralise, mitigate, and exploit.
  • DIFFERENTIATE and UNDERSTAND roles and responsibilities of staff, managers and law enforcement or authorities.
  • RECOGNISE the importance of Information Management/ Exchange in its effectiveness at all levels.
  • CREATE general awareness of signs and indicators and best practice.
  • MASTER the tactics, techniques and procedures used to counter the threat they present.
Who should attend
  • Chief Operations Officers (COO)
  • Chief Security Officers (CSO)
  • Chief Strategy Officers
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Directors and/or Managers
  • Risk Managers and/or Directors
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents. Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
Trainers

This 2-day workshop will be conducted by 2 Expert Trainers. Expert Trainers have over 30 years of experience in IED field and both military and civilian, in the safe handling, storage, movement use, and disposal of explosives and associated hazardous substances.

Testimonials

"The course was extremely well thought out, presented extremely well and the instructors were approachable and involved and interested in teaching the students."
Maj James Morgan, 277 EOD Coy USMC, EOD, HME Course, April 2015

"One of the best courses I have ever attended... in fact I am proud of this course. Thank you."
Maj Francis Ndonye, Specialist EOD Course, Kenya, Jun 2014

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Managing Internet of Things (IoT) Security Risks

Overview

This 2-day Managing Internet of Things (IoT) Security Risks Masterclass provides delegates a strategic understanding on the new threats and paradigms emerging from IoT while guiding on the right approaches in handling such threats. Due to the nature of IoT and its ubiquity, security needs to be addressed in a fundamentally different way; the devices are no longer important, but their data is. Based on the zero-trust networking, assume breach and cattle-vs-pets paradigms, this Masterclass will help delegates look at IoT security in a whole different way. 

What you will learn from this Masterclass:

  • Recognise the new threats IoT pose for an enterprise
  • Identify the threats and limitations at the technical level
  • Integrate IoT security in your existing security management
  • Determine proper responses to IoT threats
  • Refocus your security efforts to stay in control
Who will attend
  • Corporate Business Continuity
  • Corporate Infrastructure
  • Information Security 

  • Information Security and Risk

  • Network administrators
  • Network Architecture
  • Network Security Systems
  • Network Services

  • Payment and Fraud
Security
  • Payment Systems & Risk
Group
  • Security Programme
  • Security
Information Security Policy
  • System Administration
Trainer

Armed with more than 30 years of experience in this industry, Expert Trainer is an independent security consultant. Expert Trainerhas been involved in many large-scale projects including mobile security, banking security, industrial automation, covering technical and non-technical aspects.

Expert Trainer started as a technical security tester and has delivered courses on mobile security in Abu Dhabi, Kuala Lumpur, Singapore and Capetown. He has international experience in most European countries, the Caribbean, Asia and the Middle East.

Expert Trainer has consulted a large number industries ranging from ministries of Dutch government, utilities companies, banking sectors, Europol, payment providers, and Dutch Telecom operators.

Case Studies

To be confirmed.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Imagery Intelligence (IMINT) for An Enhanced Intelligence Gathering Process

Overview

This workshop provides an insight into imagery intelligence. It introduces delegates a variety of imagery types that can all be used to provide valuable additional intelligence to enhance existing sources, build target packs and gain an understanding of an area. Expert Trainer will incorporate open source tools and material to deliver the course to ensure that imagery intelligence skills can be practised and used with minimum outlay in a familiar environment.

This workshop is a practical, hands-on course and all subjects will be reinforced with practical elements and real-world examples.

What you will learn from this workshop:

  • MASTER the building blocks of Imagery Analysis.
  • IDENTIFY and EXPLOIT the different types of imagery.
  • COMPARE maps and imagery to accurately geolocate targets.
  • LEARN how to use common items to measure distances on unreferenced imagery.
  • BUILD a report using Full Motion Video.
Who should attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • ISR Operators
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Expert Trainer has more than 20 years’ experience in the British Army Intelligence Corps in which time he worked in various fields including Counter Intelligence, Technical Investigations, Information Assurance (IA), Human Intelligence (HUMINT), Imagery Intelligence (IMINT) and Cyber Security. He has worked in mainland Germany, France, Turkey, Cyprus, Oman, Qatar, Bahrain, the Balkans, Iraq, Afghanistan, and Sierra Leone, and currently teaches intelligence techniques to military staff from across the 29 NATO member nations, African partner nations and also to partners within the defence industry.

Expert Trainer
completed the 16-week United Kingdom Imagery Analysis Course in 2000 and then went on to work with the USA analysing Predator, Reaper and Hermes 450 imagery on missions for the Balkans conflict. He has also provided imagery support to operations in Sierra Leone and then managed the training and operations of the British Army Reserve Imagery Analysis unit. 

Table-top Exercises
  • This is a 3-day practical course and students are encouraged to follow the teaching on their own laptops. Teaching will be conducted through instructor led lessons and student discovery through practical exercises.
  • Students should bring a Laptop and wheel mouse with Google Earth Pro, VLC Video Player and, Paint Shop Pro installed and working. It would be useful to have an office suite with PowerPoint, OneNote or similar application. Links will be provided in the joining instructions.
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Maritime Cyber Security

Maritime Cyber Security
Overview

This workshop aims to increase awareness and provide knowledge on maritime cyber security through case studies and practical examples that attendees will be able to apply as best practises to their organisations, in order to optimise resources allocation and achieve maximum return-on-investment in the maritime sector.

It will provide the inputs required for building and maintaining a comprehensive cyber security strategy based on a risk-management approach as well as offer insights for those who want to enrich their business cyber security capability maturity.

What you will learn from this workshop: 

  • DEVELOP an understanding & awareness of key aspects of maritime cyber security.
  • UNDERSTAND the vulnerabilities of on-board and at-shore, widely used, IT and OT systems.
  • VALUE the importance of developing a risk-based cyber security strategy and policy implementation.
  • ADOPT the most suitable code of practice for cyber threat risk mitigation and contingency planning.
  • MAKE an informed decision on resources allocation for cyber security measures, tools and infrastructure.
  • IDENTIFY and select capability development content that will generate maximum impact for your organisation.
  • ACT as ambassadors in promoting a people-focused cyber culture within your organisation.
Who should attend
  • Senior managers who are looking to raise awareness on cyber security within their organisations.
  • Leaders who wish to be considered as pioneers in cyber security.
  • First line supervisors who wish to equip themselves with practical knowledge that will be applied to protect their everyday business activities from cyber threats.
  • All staff engaged, directly or indirectly, in the maritime sector (ports, shipping operators, brokers, insurers, government officials, lead auditors etc).
Trainer

Expert Trainer has over 19 years of professional experience as a navy warfare officer in NATO, EU and UN operations. Since joining the Hellenic Navy in 2003,
he rose to the rank of Lieutenant Commander, and was awarded medals and honorary awards for participation in international missions. During his time with the navy, he worked part-time as an instructor and lecturer with the Hellenic Naval Academy and the Hellenic Air Force.

Expert Trainer has worked as Editor in Chief for the Institute of International Relations at Panteion University's monthly newsletter on Naval Strategy and Maritime Security. He has also taught maritime security and cyber security at the University of Plymouth as a Visiting Research Fellow.

Table-top Exercises

Apart from case study analysis on real-life maritime-related cyber breaches, delegates will also develop a 10-step cyber security policy for your
organisation.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Hotel venue to be confirmed.

Industry Insights
Brochure Download


Insider Threat Management

Overview

This 2-day workshop on Insider Threat Management will help delegates gain a strategic understanding of risks and threats within an organisation. This workshop covers how to identify Internal Threats and its different types of Internal Threats to how to conduct a risk assessment of their organisation to deter and manage Internal Threats. This workshop presents an in-depth view of the Insider Threat problems and teaches delegates how to develop a proven and comprehensive Insider Threat Risk Mitigation Framework for detecting, deterring and managing Insider Threats.

What you will learn from this workshop: 

  • DETER, DETECT AND MITIGATE actions by insiders who represent a threat to national security and organisations.
  • RECOGNISE actions and behaviours that can signify an Insider Threat.
  • ASSESS current Insider Threat Programme for weaknesses and make enhancements.
  • IDENTIFY Insider Threat risks, vulnerabilities and weaknesses within an organisation.
  • IMPLEMENT risk mitigation strategies and actionable steps that can be taken.
  • DEVELOP and IMPLEMENT an Insider Threat Awareness and Reporting Program.
Who should attend

Anyone involved in the development, oversight, or operation of an Insider Threat or risk management program:

  • Chief Information Security Officer
  • Chief Security Officer
  • Chief Risk Officer
  • Counterintelligence Investigators
  • Facility Security Officer
  • Human Resource Manager
  • Legal Manager
  • Network Security Officer
  • Security Officer
Trainer

Expert Trainer is a highly experienced senior law enforcement, security and incident management practitioner. He has over 37 years of leadership experience in both law enforcement and the security industry. Having spent over 33 years in law enforcement with the Hong Kong Police, Peter reached the rank of Assistant Commissioner
and was awarded the Police Distinguished Service Medal (P.D.S.M.) for his exemplary service and contribution to Hong Kong.

Expert Trainer has been a speaker at numerous international conferences, including: The California Association of Hostage Negotiators, USA; The Interpol Strategic Planners Conference, France; The Razak School of Government, Malaysia; The ASEAN Regional Forum on Bio-Preparedness and Disaster Response Conference, Philippines; the Asia Emergency Management Conference; and the Risk and Resilience Conference, Singapore.

Table-top Exercises

Case study exercises will be guided by Expert Trainer and will also include:

  • Case Management on Handling Insider Threats
  • How to Develop an Insider Threat Program Blueprint.
Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements. 

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


Effective Investigative Questioning: Uncover and Prevent Potential Threats

Effective Investigative Questioning
Overview

This 2-day workshop is aimed at equipping delegates with the necessary skills and approaches of Security Questioning. Apart from general guidelines and principals of Security Questioning, delegates will learn the how to use tactical questioning to elicit information from suspects. Through this workshop, delegates will be able to apply the skills and knowledge of Security Questioning when dealing with suspicious documentation, human resource and internal investigation.

Most importantly, this workshop will teach delegates how to identify and differentiate between someone with malicious intent and someone who is duped or coerced into committing a crime. To enhance delegates’ learning experience, this workshop includes both theoretical and simulated scenarios (field exercise) to illustrate the application of Security Questioning in day-to-day security operations.

What you will learn from this Masterclass:

  • LEARN how to use tactical questioning to uncover information and intelligence from individuals, suspects and/or convicted criminals and terrorists
  • MASTER different approaches and techniques to questioning.
  • RECOGNISE and DIFFERENTIATE someone with malicious intent and someone who is duped or coerced into becoming a mule.
  • APPLY security questioning as an investigative tool to solve an internal security incident in an organisation.
  • IMPLEMENT effective security questioning processes in your own protected environment.
Who will attend
  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. Expert Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Expert Trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer. 

Expert Trainer is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

Tabletop Exercise - Developing and Testing a Cover Story

Delegates will work in groups and receive specific assignments for developing cover stories for specific missions.  They will then be challenged by their peers in the classroom who will test the strength and reliability of the cover story and the ability of the trainee to maintain it against security questioning.

Mall Field Exercise

Delegates will be tasked with specific targets and missions for which they will use their cover stories to gain information and intelligence.

Exercise Debrief

Delegates will brief each other about their experiences in the field. They will also point out weaknesses and strengths in their cover stories and behaviors as individuals and as a group.

Partners

Training Partner:

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed.

 

Industry Insights
Brochure Download


Open Source Intelligence (OSINT) for Defence and Security Investigation

Open Source Intelligence (OSINT)
Overview

This 3-day Open Source Intelligence (OSINT) for Defence and Security Masterclass provides delegates a strategic understanding on how to employ OSINT research techniques securely and efficiently. Day 1 of the Maserclass teaches delegates how to understand the language of their source would use and how to formulate that into a collection plan. It also introduces tools and techniques to enhance delegates’ research skills.

On day 2, delegates will learn verification of a course, how to use foreign sites and languages when conducting research and most importantly how to remain safe and secure whilst conducting research.  The Masterclass will include practical sessions throughout to reinforce the objectives taught.

What you will learn from this Masterclass:

  • IMPLEMENT a streamlined approach when conducting OSINT to ensure the outputs address the specific needs of the intended audience.
  • MASTER the use of Google dorking to refine your searches.
  • LEARN geolocation and verification methods.
  • MAKE the most of open source information research tools to locate, filter, and collect information and data more efficiently and effectively;
  • ADOPT a safe, secure and anonymous techniques when conducting research.
Who will attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Security Researchers
  • Counter Intelligence Investigators
Trainer

Expert Trainer completed 23 years in the British Army Intelligence Corps working in various fields including Counter Intelligence, Technical Investigations, Information Assurance, HUMINT IMINT and Cyber Security.

He developed an OSINT course to train other investigators and intelligence analysts in researching using the internet and doing it safely and anonymously.  Expert Trainer   has worked in mainland Europe, the Middle East and West Africa and currently teaches OSINT techniques to military staff across the 27 NATO nations and defence industry partners.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Hotel venue to be confirmed. 

Industry Insights
Brochure Download


Designing CCTV Security Systems

Designing CCTV Security Systems
Overview

This Design CCTV Security System Masterclass is designed to help delegates the necessary skills on how to clearly define their CCTV design outcomes and requirements. This Masterclass highlights the principles behind CCTV design and system implementation. It addresses the problems associated with poorly designed systems and the necessary tools and approaches to mitigate such risks. Case studies covered in this Masterclass is based from the instructor’s own security design experiences and practical exercises are used throughout to reinforce learning points.

The key focus area this Masterclass will cover include:

  • IDENTIFY key metrics to put in place to measure CCTV performance and benefits.
  • UNDERSTAND the steps involves in a CCTV system, from light entering a camera lens, to video transmission to post-incident investigation.
  • ESTABLISH the topology and equipment involved in a medium to large scale IP CCTV system.
  • GAIN INSIGHTS into the definition of various technical parameters commonly seen on CCTV system.
  • EXAMINE how video surveillance systems form part of the IoT and cyber security risks that need to be mitigated
Who will attend

The workshop is aimed at security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.

  • Architects
  • Business continuity managers
  • Crisis response managers
  • Facilities management managers
  • Government ministries
  • Installation engineers
  • Maintenance engineers
  • Managers
  • Operators
  • Security practitioners
  • State security agencies
  • Strategic planner & managers
  • Strategic risk managers
  • Supervisors
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users.
Trainer

Expert Trainer is a highly qualified executive security and risk professional with an extremely wide breadth of experience providing security risk management consulting to sectors including defence, government, critical infrastructure, ports and marine, resources, data centres, mixed use developments, mass rapid transport, aviation, health, and education.

Expert Trainer’s experience spans the Asia Pacific and the Gulf (GCC) and regions, where he has applied a strong combination of technical, project management and business development skills.

During his time at Aurecon in Canberra (Australia’s political capital), Expert Trainer played key roles in advising state Government and Defence clients across a wide variety of projects. Highlights include leading the design of Canberra’s whole-of-city CCTV System over 2 years and performing security surveys of Defence facilities across Australia storing weapons, munitions and explosives.

He also undertook security design for the Australian Federal Police to house narcotics, firearms and seized contraband. Apart from that, Expert Trainer advised Australian Customs regarding the use of CCTV, geo-spatial crime statistical analysis for law enforcement and a rapid 150 camera CCTV System design for Oasis Hospital in the United Arab Emirates.

Expert Trainer has also advised Department of Defence RAAF Base on Tindal CCTV Design where he designed a high-performance CCTV, based on the Honeywell DVM platform for the Base perimeter and Jet Fighter Ordnance Loading Aprons.

He has also led the security design for the WA State iconic building One40 William, a 20-storey building with construction cost of $216M. The security was tailored to WA State specific requirements and included CCTV, access control, alarm and entrance control technology.

Case Studies

HIGH IMPACT LEARNING - EXERCISE

Participants will perform a theoretical design exercise with due consideration to camera placement, field of view, resolution, bandwidth and storage.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Venue to be confirmed.

Industry Insights
Brochure Download


Advanced Intelligence Analysis Masterclass

Advanced Intelligence Analysis
Overview

This Masterclass will introduce delegates to various techniques and approaches of Intelligence Analysis. The emphasis of the Masterclass is on managing the processes used in the Intelligence Cycle ensuring intelligence is directed, produced and delivered efficiently. Delegates will also learn and practise how to plan and collect information from national and international open and closed sources.

This Masterclass provides opportunities to evaluate and collate information, use different analysis techniques to transform information into intelligence and most importantly how to apply critical thinking techniques and dealing their own biases when gathering information.

What you will learn from this Masterclass:

  • MASTER the methods and tools which are used in intelligence analysis.
  • DIFFERENTIATE the differences between information and intelligence.
  • APPLY critical thinking techniques to information to provide better understanding.
  • UNDERSTAND and exploit the steps of the Intelligence Cycle.
  • USE and FUSE multiple intelligence source to create credible reports.
Who will attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Counter Intelligence Investigators
  • Cybercrime Intelligence Officers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Expert Trainer has more than 20 years’ experience in the British Army Intelligence Corps in which time he worked in various fields including Counter Intelligence, Technical Investigations, Information Assurance (IA), Human Intelligence (HUMINT), Imagery Intelligence (IMINT) and Cyber Security.  He has experience across most strands of the Intelligence world and gained particular insight by undertaking a variety of roles. Expert Trainer has worked as an operator, analyst and manager and he was the technical investigations subject matter expert (SME) for Army Headquarters.

Expert Trainer has worked in mainland Germany, France, Turkey, Cyprus, Oman, Qatar, Bahrain, the Balkans, Iraq, Afghanistan, and Sierra Leone, and currently teaches intelligence techniques to military staff from across the 29 NATO member nations, African partner nations and also to partners within the defence industry.

Case Studies

Case studies covered in this Masterclass is based from the instructor’s own military intelligence experiences and practical exercises are used throughout to reinforce learning points.

The different analytical techniques introduced during the masterclass will be practised with exercises to reinforce the application.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore

442 Orchard Rd, Singapore 238879

Tel: +65 6734 7766

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download