[Expert-Led Digital Masterclass] Cyber Warfare and Operations Design

Overview

This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn from this Masterclass:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


[Expert-Led Masterclass] Open Source and Social Media Intelligence

Overview

Highlights:

  • In-person masterclass that is taking place in Kuala Lumpur, Malaysia.

This masterclass is a full hands-on interactive course where the methodology and best practice is explained, and then the students practice the tradecraft live and online. Please be advised that this course is almost 50% practical workshops and exercises, so your own laptop is essential. The course will be a presentation and demonstration of the techniques. Students are encouraged to follow along during the course on the own laptop.

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer is a globally recognised communications data expert, who works as an adviser, trainer and consultant to security services, government and police forces around the world.

His experience, and USP, is based on 38 years as a detective, which includes experience gained working for the UK National Crime Agency (NCA), Metropolitan police, Child Exploitation and Online Exploitation (CEOP), and UK/US government agencies, in the capacity of overt, reactive and covert operations management.

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and
relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will take place in Kuala Lumpur. We will send more details to the participants upon registration or closer to the date of the event.

For more information, please contact: hello@q8asia.com.sg.

Brochure Download


[Expert Led Masterclass] Mastering Video Surveillance Systems

Overview

Gain invaluable insights into the latest advancements in VSS technology, including camera types, video analytics, and situational awareness in this masterclass.  Apply what you learned from real-world scenarios and VSS techniques to detect and prevent intrusions, monitor critical areas, and responding effectively to incidents. 

Equip yourself with the knowledge and skills to design and implement cutting-edge VSS solutions that address the evolving security landscape.

  • UNDERSTAND the intention and elements of Video Surveillance Systems (VSS), including situational awareness, intrusion detection, life-safety elements, and the impact of artificial intelligence.
  • MASTER VSS and security network design considerations, such as bandwidth, cabling options, power requirements, equipment location, data storage, and information security.
  • EXPLORE coverage zone planning to meet operational requirements.
  • DETERMINE system requirements based on operational needs, including resolution, lighting, and analytics requirements.
  • IDENTIFY layout and location planning considerations, including environmental factors and accessibility.
  • DESIGN monitoring and control locations, considering incident response and ergonomic factors.
  • LEARN about post-incident analysis using recorded footage features.
  • GAIN INSIGHTS into stakeholder requirements and operational considerations that inform system specifications.
Who will attend

The workshop is ideal for security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users, including:

  • Business continuity, crisis response and strategic risk managers
  • Facilities management managers
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Strategic planners & managers
Trainer

Our Expert Trainer is a skilled security system professional with over 15 years of security system design and implementation experience in various sectors, including expansive public realm systems, high value office and museum developments as well as government and military systems. 

He is fully versed in current security technologies and developments of such systems, capable of designing systems of various complexities and providing information of suitable quality for the whole design process, from concept through to construction level information.

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


[Expert Led Masterclass] Security Design for Critical Infrastructures & Public Spaces

Overview

This two-day in-depth and hands-on workshop designed to equip you with the essential expertise, knowledge, and strategies for designing foolproof security systems. 

Tailored for those involved in the construction of critical infrastructures and public spaces, you will gain timely insights and practical strategies to effectively safeguard these vital assets.

  • DETERMINE the evidence required to demonstrate security.
  • UNDERSTAND of the Security Management approach to safeguard assets and business processes.
  • INSIGHTS into different modes of operation and their impact on security.
  • IDENTIFY of how facility surroundings can affect security.
  • DEFINE user groups and their security needs.
  • KNOWLEDGE of facility security constraints and objectives.
  • APPLY Operational Requirements (ORs) to inform security system requirements.
  • GAIN AWARENESS of the security risks associated with critical infrastructures and public spaces.
Who will attend

The workshop is ideal for security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users, including:

  • Business continuity, crisis response and strategic risk managers
  • Facilities management managers
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Strategic planners & managers

Professionals from the following sectors:

  • Airport, ports, rail
  • Diplomatic service
  • Education institutions & schools
  • Financial institutions & data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & border control
  • Oil & gas infrastructure
  • Power plant and public utilities
  • Retail, sports and hospitality sectors
Trainer

Expert Trainer has 24 years of experience in security related field. A Chartered Security Professional, he is a member of Lead writing team for ASIS International Physical Assets Protection Standard. He has designed security for the London 2012 Olympic Games Main Stadium, which was the
first stadium to achieve a Secured by Design award.

 

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


[Expert-Led Digital Masterclass] Digital Surveillance Techniques Course

Overview

Highlights:

  • Intensive 12-Hour Course
  • Remote Access
  • More than 12 hours of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence of individuals through digital shadow.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to Crime group intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet and encrypted channels and hidden chat rooms.
  • STRENGTHEN investigative skills to meet to combat the ever increasing problem of encryption.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples and practical exercises will be conducted throughout this 2-day course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely. Our onboarding package will ensure a smooth learning experience.
Not to worry, we're ready to answer any questions, reach us at hello@q8asia.com.sg.

Brochure Download


[Expert-Led Masterclass] Reading Suspicious Indicators & The Adversary’s MO

Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will learn more about Suspicious Indicators and Adversary’s Methods of Operations, allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will also learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who should attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

Professionals such as:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our  Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. The Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

He is a

  • Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates
  • Registered NSW security trainer.
  • Member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.
  • Regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.
Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’
Partners

Training Partner:

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Details will be sent to attendees closer to the date of the course.

Brochure Download


[Expert-Led Masterclass] Reading Suspicious Indicators & The Adversary’s MO

Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will learn more about Suspicious Indicators and Adversary’s Methods of Operations, allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will also learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who should attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

Professionals such as:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our  Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. The Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

He is a

  • Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates
  • Registered NSW security trainer.
  • Member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.
  • Regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.
Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’
Partners

Training Partner:

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Details will be sent to attendees closer to the date of the course.

Brochure Download


[Expert Led Digital Masterclass] Advanced Intelligence Analysis

Overview

This Masterclass will introduce delegates to various techniques and approaches of Intelligence Analysis. The emphasis of the Masterclass is on managing the processes used in the Intelligence Cycle ensuring intelligence is directed, produced and delivered efficiently. Delegates will also learn and practise how to plan and collect information from national and international open and closed sources.

This Masterclass provides opportunities to evaluate and collate information, use different analysis techniques to transform information into intelligence and most importantly how to apply critical thinking techniques and dealing their own biases when gathering information.

What you will learn from this Masterclass:

  • MASTER the methods and tools which are used in intelligence analysis.
  • DIFFERENTIATE the differences between information and intelligence.
  • APPLY critical thinking techniques to information to provide better understanding.
  • UNDERSTAND and exploit the steps of the Intelligence Cycle.
  • USE and FUSE multiple intelligence source to create credible reports.
Who should attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Counter Intelligence Investigators
  • Cybercrime Intelligence Officers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer has more than 20 years’ experience in the British Army Intelligence Corps in which time he worked in various fields including Counter Intelligence, Technical Investigations, Information Assurance (IA), Human Intelligence (HUMINT), Imagery Intelligence (IMINT) and Cyber Security.  He has experience across most strands of the Intelligence world and gained particular insight by undertaking a variety of roles. Our trainer has worked as an operator, analyst and manager and he was the technical investigations subject matter expert (SME) for Army Headquarters.

Our second Expert Trainer has worked in mainland Germany, France, Turkey, Cyprus, Oman, Qatar, Bahrain, the Balkans, Iraq, Afghanistan, and Sierra Leone, and currently teaches intelligence techniques to military staff from across the 29 NATO member nations, African partner nations and also to partners within the defence industry.

Case Studies

Our trainer will use case studies to illustrate the different analytical techniques that are covered in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about this online course closer to the date of the course.

Brochure Download


[Expert-Led Masterclass] Real World Surveillance Techniques Course

Overview

Highlights:

  • Certificate of Completion

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence of individuals through digital shadow.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to Crime group intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet and encrypted channels and hidden chat rooms.
  • STRENGTHEN investigative skills to meet to combat the ever increasing problem of encryption.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples and practical exercises will be conducted throughout this 2-day course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This in-person Masterclass will be held at Orchard Hotel Singapore. Participants will receive more information closer to the date of the class. For more information, please email us at hello@q8asia.com.sg.

Brochure Download


[Expert Led Masterclass] Effective Investigative Questioning

Overview

This 2-day workshop is aimed at equipping delegates with the necessary skills and approaches of Security Questioning. Apart from general guidelines and principals of Security Questioning, delegates will learn the how to use tactical questioning to elicit information from suspects. Through this workshop, delegates will be able to apply the skills and knowledge of Security Questioning when dealing with suspicious documentation, human resource and internal investigation.

Most importantly, this workshop will teach delegates how to identify and differentiate between someone with malicious intent and someone who is duped or coerced into committing a crime. To enhance delegates’ learning experience, this workshop includes both theoretical and simulated scenarios (field exercise) to illustrate the application of Security Questioning in day-to-day security operations.

What you will learn from this Masterclass:

  • LEARN how to use tactical questioning to uncover information and intelligence from individuals, suspects and/or convicted criminals and terrorists
  • MASTER different approaches and techniques to questioning.
  • RECOGNISE and DIFFERENTIATE someone with malicious intent and someone who is duped or coerced into becoming a mule.
  • APPLY security questioning as an investigative tool to solve an internal security incident in an organisation.
  • IMPLEMENT effective security questioning processes in your own protected environment.
Who should attend
  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. He has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Our trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer.

He is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

Tabletop Exercise - Developing and Testing a Cover Story

Delegates will work in groups and receive specific assignments for developing cover stories for specific missions.  They will then be challenged by their peers in the classroom who will test the strength and reliability of the cover story and the ability of the trainee to maintain it against security questioning.

Mall Field Exercise

Delegates will be tasked with specific targets and missions for which they will use their cover stories to gain information and intelligence.

Exercise Debrief

Delegates will brief each other about their experiences in the field. They will also point out weaknesses and strengths in their cover stories and behaviors as individuals and as a group.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about the venue closer to the date of the course.

Brochure Download