Offensive OSINT on Critical Infrastructure with AI

Overview

Highlights:

This hands-on, three-day workshop designed for professionals in cybersecurity, intelligence, and emergency response. Through real-world simulations and scenario-based exercises, participants will learn how to transform raw data into actionable insights to monitor, analyze, and protect critical infrastructure.

What will you learn:

  • Engage in scenario-based exercises using AI-powered OSINT tools to monitor large events, natural disasters, and infrastructure sites.
  • Learn to collect and analsze intelligence from satellite imagery, social media, public databases, and real-time feeds.
  • Apply prompt engineering and automation to enhance intelligence gathering, including detecting deepfakes and synthesising multilingual data.
  • Build custom dashboards and geolocation heatmaps to support crisis management and security planning.
Who should attend

This workshop is designed for professionals and practitioners responsible for protecting critical infrastructure and managing security operations, including:

  • Intelligence analysts
  • OSINT specialists
  • Cybersecurity professionals
  • Risk managers, and security consultants seeking to expand their expertise in situational awareness.
  • Law enforcement officers
  • Emergency response coordinators, and other decision-makers responsible for the security of cities, major events, and critical assets.
Trainer

Our Expert Trainer is the Founder of Offensive OSINT community and OS-Surveillance system (Acquired by Altia Intel), with over 9 years of cyber security and Open Source Intelligence experience, specialising in geospatial intelligence and investigative research. 

He has assisted organisations and governments worldwide in addressing data leaks, protecting critical infrastructure, and enhancing security operations. He has also actively participated in complex OSINT investigations, combining hands-on experience with advanced analytical techniques. In addition, our trainer has developed numerous open-source tools that support the OSINT community to improve intelligence gathering capabilities.

Case Studies

The course will include case studies with practical, hands-on experience. 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

The course will be held at M Hotel, 81 Anson Road, Singapore, 079908

For assistance, write to hello@q8asia.com.sg

Brochure Download


Tactical Man Tracking for Law Enforcement and Military

Overview

Highlights:

  • 3 day masterclass.
  • Certificate of Completion for participants upon request

This masterclass is based upon over 45 years operational experience and embodies all the crucial skills, techniques, and tactics to enable the attendees to confidently and competently operate as individual or team trackers

What you will learn in this Masterclass:

  • ENHANCE situational awareness by learning tracking terminology, basic techniques, and tracking indicators, attendees can better understand their surroundings and identify potential threats.
  • IMPROVE tracking skills through the understanding of dynamics of a footprint, lost spoor procedures, assessing the age of spoor, and anti-tracking/counter-tracking techniques.
  • LEARN about the roles of the tracking team and tracking team formations, enabling attendees to operate effectively in a team setting.
  • UNDERSTAND the rules of tracking and applying them in real-life scenarios, as demonstrated through case studies.
  • EQUIP law enforcement professionals with essential skills that can help improve their effectiveness in the field and enhance their safety and that of the public.
Who should attend
  • Police Officers and Detectives
  • K9 Unit Officers and Handlers
  • Tactical Response Team (SWAT) Members
  • Corrections Officers and Supervisors
  • Border Patrol Agents and Supervisors
  • Search and Rescue Personnel and Volunteers
  • Military Personnel, including Special Operations Forces
  • Executive Protection Agents and Bodyguards

and other law enforcement and security professionals who would benefit from attending a Tactical Tracking course, depending on their specific roles and responsibilities.

Trainer

Our Expert Trainer is the CEO & Operations/Training Director for the Scott Donelan Tracking School with

  • Over 26 years of experience in Tactical Tracking
  • Experienced in planning and conducting all tactical and non-tactical operations in both rural and urban environments 
  • Experienced instructor in classes for Law Enforcement and Military personnel throughout the United States and globally.
Case Studies

Relevant case studies and examples will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This in-person Masterclass will be held in Singapore.

For more information, email: hello@q8asia.com.sg.

Brochure Download


Setting Up Sock Puppet Accounts for Counter Terrorism

Overview

Highlights:

  • 2-day in-person masterclass in Singapore
  • Certificate of Completion on request

What you will learn from this Masterclass:

This two-day workshop focuses on the critical role of sock puppet accounts in counter-terrorism operations. Participants will learn to create and manage convincing fake online personas, gather real-time intelligence, and infiltrate extremist networks. The workshop covers operational security (OPSEC), risk assessment, and the distinctions between passive and active accounts.  

  • DEVELOP strategies for real-time intelligence gathering within terrorist networks. 
  • UTILISE sock puppet accounts to propagate counter-narratives and support counter-radicalisation initiatives. 
  • UNDERSTAND key principles and practices to ensure operational security when using sock puppet accounts, including risk assessment and mitigation strategies. 
  • DISTINGUISH the characteristics, uses, and guidelines for employing passive and active sock puppet accounts to balance engagement and risk. 
  • DISCOVER the importance of detailed and consistent backstories in creating credible personas that can withstand scrutiny. 
  • MASTER strategies for engaging with targets, building trust, extracting information, and managing conflicts without compromising the account. 

 

Who should attend
  • Counter-Terrorism Analysts 
  • Intelligence Officers 
  • Cybersecurity Specialists 
  • Law Enforcement Agents 
  • National Security Advisors 
  • Investigative Journalists 
  • Social Media Analysts 
  • Digital Forensics Experts 
  • Government Policy Makers 
  • Anti-Radicalisation Program Coordinators 
  • Crisis Management Professionals 
  • Military Intelligence Personnel 
Trainer

About Our Expert Trainer

  • More than 25 Years in Intelligence & OSINT Operations
  • Delivered OSINT and intelligence training for military, police, and government bodies, including NATO, the United Nations, the UK Ministry of Defence, and foreign security agencies.
  • Specialist in Digital Investigations & Threat Analysis
  • Strategic Advisor on Intelligence & Security Operations

 

Case Studies

Relevant case studies will be added to this masterclass.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Advanced Intelligence Analysis & Horizon Scanning

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Participation upon request.

Intelligence analysis can provide insights into important questions (e.g. why and what happens next?). In the wake of recent events, identifying abstract relationships and asymmetrical threats that maybe easily overlooked. Participate in this Masterclass to master with necessary skills for Intelligence Analysis to produce accurate information to prevent future threats and keep possible threats from arising.

What you will learn in this Masterclass:

  • MASTER the methods and tools which are used in intelligence analysis.
  • DIFFERENTIATE the differences between information and intelligence.
  • APPLY critical thinking techniques to information to provide better understanding.
  • UNDERSTAND and apply the steps of the Intelligence Cycle.
  • USE and APPLY multiple intelligence sources to create credible reports
Who should attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Counter Intelligence Investigators
  • Cybercrime Intelligence Officers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer is an experienced intelligence professional, trainer, and consultant specialising in Open-Source Intelligence (OSINT), intelligence fusion, and strategic analysis. With over 25 years of service as a British Army Reserve officer in the Intelligence Corps, our trainer has worked extensively with government agencies, law enforcement, and security organisations worldwide, providing critical intelligence support and training.

Case Studies

Our trainer will use case studies to illustrate the different analytical techniques that are covered in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

Brochure Download


Radicalisation Through Conspiracy Theories and Misinformation

Overview

Highlights:

  • 2 day masterclass
  • Certificate of Completion for participants upon request

What you will learn in this Masterclass:

This 2-day course, with its focus on Asia, explores the tools that can be used to detect, disrupt, and respond to radicalisation pathways that are driven by online conspiracy narratives.

  • IDENTIFY key types of misinformation, disinformation, and conspiracy narratives relevant to Asia
  • ANALYSE how social media algorithms fuel extremist mobilisation
  • RECOGNISE early warning signs of radicalisation through digital footprints and behaviour patterns
  • EXAMINE real Southeast Asian case studies to extract radicalisation trends
  • UNDERSTAND the psychology and vulnerabilities that make individuals—especially youths susceptible
  • APPLY intervention strategies suited to the Asian context
  • ASSESS operational challenges such as platform moderation limits and evasion tactics
  • DEVELOP counter-messaging and digital literacy campaigns for targeted audiences
  • CREATE agency-specific action plans to detect, disrupt, and prevent extremist threats
Who should attend
  • Law enforcement officers involved in intelligence, investigations, or community policing
  • Counter-terrorism and homeland security personnel
  • Cybercrime and digital forensics units
  • Analysts monitoring extremist content and online threats
  • Officers engaged in youth outreach and prevention programs
  • Security and intelligence planners in government agencies
Trainer

About Our Expert Trainer:

  • A former extremist turned undercover operative for the Canadian Security Intelligence Service(CSIS) & Royal Canadian Mounted Police (INSET), infiltrating extremist & terrorist cells.
  • An Expert in radicalisation, deradicalization, countering violent extremism(CVE), National security and counter-terrorism.
  • He testified as an expert to the United Nations Security Council, U.S. Senate Committee on Homeland Security, U.S. Special Operations Command, & numerous police & intelligence services around the world.
  • Currently a Professor of Public Safety, Crime & Intelligence Analysis
  • Co-author of the acclaimed book, "Undercover Jihadi".
Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Introduction to Cyber Warfare and Operations Design (ICWOD)

Overview

This online course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn in this online course:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


Radicalisation Through Conspiracy Theories and Misinformation

Overview

Highlights:

  • 2 day masterclass
  • Certificate of Completion for participants upon request

What you will learn in this Masterclass:

This 2-day course, with its focus on Asia, explores the tools that can be used to detect, disrupt, and respond to radicalisation pathways that are driven by online conspiracy narratives.

  • IDENTIFY key types of misinformation, disinformation, and conspiracy narratives relevant to Asia
  • ANALYSE how social media algorithms fuel extremist mobilisation
  • RECOGNISE early warning signs of radicalisation through digital footprints and behaviour patterns
  • EXAMINE real Southeast Asian case studies to extract radicalisation trends
  • UNDERSTAND the psychology and vulnerabilities that make individuals—especially youths susceptible
  • APPLY intervention strategies suited to the Asian context
  • ASSESS operational challenges such as platform moderation limits and evasion tactics
  • DEVELOP counter-messaging and digital literacy campaigns for targeted audiences
  • CREATE agency-specific action plans to detect, disrupt, and prevent extremist threats
Who should attend
  • Law enforcement officers involved in intelligence, investigations, or community policing
  • Counter-terrorism and homeland security personnel
  • Cybercrime and digital forensics units
  • Analysts monitoring extremist content and online threats
  • Officers engaged in youth outreach and prevention programs
  • Security and intelligence planners in government agencies
Trainer

About Our Expert Trainer:

  • A former extremist turned undercover operative for the Canadian Security Intelligence Service(CSIS) & Royal Canadian Mounted Police (INSET), infiltrating extremist & terrorist cells.
  • An Expert in radicalisation, deradicalization, countering violent extremism(CVE), National security and counter-terrorism.
  • He testified as an expert to the United Nations Security Council, U.S. Senate Committee on Homeland Security, U.S. Special Operations Command, & numerous police & intelligence services around the world.
  • Currently a Professor of Public Safety, Crime & Intelligence Analysis
  • Co-author of the acclaimed book, "Undercover Jihadi".
Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Offensive OSINT on Critical Infrastructure with AI

Overview

Highlights:

This hands-on, three-day workshop designed for professionals in cybersecurity, intelligence, and emergency response. Through real-world simulations and scenario-based exercises, participants will learn how to transform raw data into actionable insights to monitor, analyze, and protect critical infrastructure.

What will you learn:

  • Engage in scenario-based exercises using AI-powered OSINT tools to monitor large events, natural disasters, and infrastructure sites.
  • Learn to collect and analsze intelligence from satellite imagery, social media, public databases, and real-time feeds.
  • Apply prompt engineering and automation to enhance intelligence gathering, including detecting deepfakes and synthesising multilingual data.
  • Build custom dashboards and geolocation heatmaps to support crisis management and security planning.
Who should attend

This workshop is designed for professionals and practitioners responsible for protecting critical infrastructure and managing security operations, including:

  • Intelligence analysts
  • OSINT specialists
  • Cybersecurity professionals
  • Risk managers, and security consultants seeking to expand their expertise in situational awareness.
  • Law enforcement officers
  • Emergency response coordinators, and other decision-makers responsible for the security of cities, major events, and critical assets.
Trainer

Our Expert Trainer is the Founder of Offensive OSINT community and OS-Surveillance system (Acquired by Altia Intel), with over 9 years of cyber security and Open Source Intelligence experience, specialising in geospatial intelligence and investigative research. 

He has assisted organisations and governments worldwide in addressing data leaks, protecting critical infrastructure, and enhancing security operations. He has also actively participated in complex OSINT investigations, combining hands-on experience with advanced analytical techniques. In addition, our trainer has developed numerous open-source tools that support the OSINT community to improve intelligence gathering capabilities.

Case Studies

The course will include case studies with practical, hands-on experience. 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

The course will be held at M Hotel, 81 Anson Road, Singapore, 079908

For assistance, write to hello@q8asia.com.sg

Brochure Download


Advanced Intelligence Analysis Masterclass

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Participation upon request.

Intelligence analysis can provide insights into important questions (e.g. why and what happens next?). In the wake of recent events, identifying abstract relationships and asymmetrical threats that maybe easily overlooked. Participate in this Masterclass to master with necessary skills for Intelligence Analysis to produce accurate information to prevent future threats and keep possible threats from arising.

What you will learn in this Masterclass:

  • MASTER the methods and tools which are used in intelligence analysis.
  • DIFFERENTIATE the differences between information and intelligence.
  • APPLY critical thinking techniques to information to provide better understanding.
  • UNDERSTAND and apply the steps of the Intelligence Cycle.
  • USE and APPLY multiple intelligence sources to create credible reports
Who should attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Counter Intelligence Investigators
  • Cybercrime Intelligence Officers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer is an experienced intelligence professional, trainer, and consultant specialising in Open-Source Intelligence (OSINT), intelligence fusion, and strategic analysis. With over 25 years of service as a British Army Reserve officer in the Intelligence Corps, our trainer has worked extensively with government agencies, law enforcement, and security organisations worldwide, providing critical intelligence support and training.

Case Studies

Our trainer will use case studies to illustrate the different analytical techniques that are covered in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

Brochure Download


Introduction to Cyber Warfare and Operations Design (ICWOD)

Overview

This online course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn in this online course:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download