Events List Navigation
Apply surveillance tools to real world situations to track criminals and their digital shadows...
[Expert-Led Digital Masterclass] Detecting Radicalisation and HVE via Cyber intelligence and Social Media Intelligence
Learn how terrorists are using the social media and cyber tools to radicalise and recruit new followers.
Learn more about operating an undercover platform to infiltrate terrorist groups in the ongoing war against terror threats.
Tactical data links are used to transmit, relay or receive military communication via radio waves or cable. This course covers the use of TDLs and the various technologies in an operational context.
Join this course to learn more about the predictive profiling tools that can be used for threat assessments
Most businesses fail to take note of insider risk, which centers on the people and their operations, and is just as critical today for any organisation large or small...
Investigate crypto transactions and track illegal transactions on the web.
Learn about “sock puppets” and how they can be used to spread through social media.
Maritime incident and accident investigations frequently requires expert witnesses, reports and...
Sign up for this course to learn the tradecraft secrets of intelligence gathering, investigation and target assessment in covert operations.
This 4 day course offers advanced level tools for OSINT and SOCMINT intelligence gathering
Learn about the drafting of contracts/agreements for the Oil & Gas / LNG sector.
As supply chain issues continue, we can expect raising costs with inflation and labour crunch...