Open Source Intelligence and Social Media Intelligence

Overview

Highlights:

  • 2-day masterclass
  • Certificate of Completion awarded on request

This masterclass is a fully interactive course that covers the best practices with using OSINT and SOCMINT tools during online investigations. The course will include slide presentations and demos by the trainer. As this is also a practical class, participants are required to bring along their own laptops for a 'hands-on' session.

What you will learn in this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer:

Our trainer is a globally recognised communications data expert, who works as an adviser, trainer and consultant to security services, government and police forces around the world. He has more than 38 years of experience as a detective, which includes experience gained working for the UK National Crime Agency (NCA), Metropolitan police, Child Exploitation and Online Exploitation (CEOP), and UK/US government agencies, in the capacity of overt, reactive and covert operations management.

Case Studies

Cases and examples, both current and historic will be added where relevant.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will take place in one of the hotel venues in Singapore. We will send more details to the participants upon registration or closer to the date of the event.

For more information, please contact: hello@q8asia.com.sg.

Brochure Download


Harnessing AI for Intelligence Gathering

Overview

Highlights:

  • 3 day masterclass.
  • Certificate of Completion for participants upon request

What you will learn in this Masterclass:

In an era where crises can escalate within moments, intelligence professionals face the challenge of sifting through vast amounts of data while making rapid decisions. This workshop equips participants with cutting-edge skills to handle such scenarios efficiently.

Using AI tools like ChatGPT, participants will learn to extract and validate critical information, generate situational awareness maps, and draft public messages that calm communities. They will explore ethical frameworks while simulating real-life challenges such as tracking smuggling networks or analysing foreign-language data. This training is vital for professionals seeking to enhance operational readiness in dynamic, high-pressure environments.

  • EQUIP participants with skills to craft prompts that yield specific, relevant, and actionable outputs tailored to security and emergency needs.
  • LEARN to frame prompts that yield actionable insights across intelligence and emergency operations.
  • MASTER techniques to filter, summarise, and visualise data from real-time feeds to support decision-making
  • IDENTIFY common techniques like indirect questioning and layered prompts that aim to exploit AI limitations.
  • CREATE realistic personas for OSINT and investigative tasks.
Who should attend

This training is ideal for professionals involved in countering radicalisation and extremism, including: 

  • Counter-Terrorism Analysts
  • Intelligence Officers
  • Cybersecurity Specialists
  • Law Enforcement Agents
  • National Security Advisors
  • Investigative Journalists
  • Social Media Analysts
  • Digital Forensics Experts
  • Government Policy Makers
  • Anti-Radicalisation Program Coordinators
  • Crisis Management Professionals
  • Military Intelligence Personnel
Trainer

About Our Expert Trainer:

Our trainer is a globally recognised communications data expert, who works as an adviser, trainer and consultant to security services, government and police forces around the world. He has more than 38 years of experience as a detective, which includes experience gained working for the UK National Crime Agency (NCA), Metropolitan police, Child Exploitation and Online Exploitation (CEOP), and UK/US government agencies, in the capacity of overt, reactive and covert operations management.

Case Studies

Relevant case studies will be added to this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Venue details will be shared with the participants closer to the date of the masterclass. For more information, contact: hello@q8asia.com.sg

Brochure Download


Introduction to Cyber Warfare and Operations Design (ICWOD)

Overview

This online course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn in this online course:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


Radicalisation Through Conspiracy Theories and Misinformation

Overview

Highlights:

  • 2 day masterclass
  • Certificate of Completion for participants upon request

What you will learn in this Masterclass:

This 2-day course, with its focus on Asia, explores the tools that can be used to detect, disrupt, and respond to radicalisation pathways that are driven by online conspiracy narratives.

  • IDENTIFY key types of misinformation, disinformation, and conspiracy narratives relevant to Asia
  • ANALYSE how social media algorithms fuel extremist mobilisation
  • RECOGNISE early warning signs of radicalisation through digital footprints and behaviour patterns
  • EXAMINE real Southeast Asian case studies to extract radicalisation trends
  • UNDERSTAND the psychology and vulnerabilities that make individuals—especially youths susceptible
  • APPLY intervention strategies suited to the Asian context
  • ASSESS operational challenges such as platform moderation limits and evasion tactics
  • DEVELOP counter-messaging and digital literacy campaigns for targeted audiences
  • CREATE agency-specific action plans to detect, disrupt, and prevent extremist threats
Who should attend
  • Law enforcement officers involved in intelligence, investigations, or community policing
  • Counter-terrorism and homeland security personnel
  • Cybercrime and digital forensics units
  • Analysts monitoring extremist content and online threats
  • Officers engaged in youth outreach and prevention programs
  • Security and intelligence planners in government agencies
Trainer

About Our Expert Trainer:

  • A former extremist turned undercover operative for the Canadian Security Intelligence Service(CSIS) & Royal Canadian Mounted Police (INSET), infiltrating extremist & terrorist cells.
  • An Expert in radicalisation, deradicalization, countering violent extremism(CVE), National security and counter-terrorism.
  • He testified as an expert to the United Nations Security Council, U.S. Senate Committee on Homeland Security, U.S. Special Operations Command, & numerous police & intelligence services around the world.
  • Currently a Professor of Public Safety, Crime & Intelligence Analysis
  • Co-author of the acclaimed book, "Undercover Jihadi".
Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Introduction to Cyber Warfare and Operations Design (ICWOD)

Overview

This online course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn in this online course:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


Introduction to Cyber Warfare and Operations Design (ICWOD)

Overview

This online course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn in this online course:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


Covert and Overt HUMINT: Source handling & tactical questioning

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Completion for participants upon request

What you will learn from this Masterclass:

This 2-day Covert & Overt HUMINT Workshop equips defence and security personnel in the SEA region with essential skills for human intelligence (HUMINT) operations.

  • DEVELOP a foundational understanding of Human Intelligence (HUMINT) operations.
  • DIFFERENTIATE between various types of HUMINT sources and collection methods.
  • APPLY effective debriefing, interviewing, and questioning techniques in operational environments.
  • UNDERSTAND the legal and ethical considerations surrounding HUMINT operations.
  • GAIN hands-on experience in covert source handling, both in physical and online environments.
Who should attend
  • Intelligence Officers
  • Special Operations Forces (SOF) Operators
  • Military Police Investigators
  • Psychological Operations (PSYOPS) Specialists
  • Counterintelligence Officers
  • Criminal Investigators & Detectives
  • Counterterrorism Officers
  • Undercover Operatives
  • Surveillance & Covert Operations Specialists
  • National Security Analysts
  • HUMINT Officers & Case Officers
  • Border Security & Immigration Officers
  • Cyber Intelligence Analysts (OSINT & SOCMINT)
  • Interrogators & Tactical Questioning Experts
  • Corporate Security Intelligence Analysts
  • Risk & Threat Assessment Specialists
  • Private Investigators & Security Consultants
Trainer

Our Expert Trainer is an experienced intelligence practitioner, with  eighteen years miliary knowledge and eight years national and international law enforcement skills.

Chris started his military career in the Royal Anglian Regiment, serving five years and gaining experience of resource management, combat and survival skills, risk management skills and a practical understanding of warfare. Deploying overseas, Chris gained a valuable insight into the role of NATO and international defence.

Perseus Intelligence was created from a passion for sharing knowledge and experience of intelligence, to support those who wish to pursue an exciting and rewarding career.

Case Studies

Where possible, relevant case studies will be added and discussed during this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about this course closer to the date of the course.

Brochure Download


Counter-Terrorism & Radicalisation Pathways in SEA

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Completion for participants upon request

What you will learn from this Masterclass:

In today's evolving threat landscape in Southeast Asia, despite efforts like Indonesia's deradicalisation programs, extremist networks such as Jamaah Ansharut Daulah (JAD) continue to exploit online platforms for recruitment, heightening radicalisation risks, especially among youth. This workshop offers a unique opportunity to develop actionable strategies to address these threats, mitigate risks, and implement region-specific countermeasures against radicalisation and foreign influence.

  • ENHANCE UNDERSTANDING of advanced threat identification techniques tailored to Southeast Asian contexts.
  • GAIN INSIGHTS into the behavioral patterns of radicalised individuals and groups specific to the region.
  • IDENTIFY radicalisation triggers, ideological markers, and community influences unique to Southeast Asia.
  • ANALYSE foreign influence operations impacting Southeast Asia and explore methods to counter them effectively.
  • CREATE actionable intervention plans tailored to Southeast Asian communities, addressing specific challenges.
  • APPLY a comprehensive toolkit of strategies and techniques learned throughout the course in a guided workshop.
Who should attend

This training is ideal for professionals involved in countering radicalisation and extremism, including: 

  • Intelligence Analysts
  • Counterterrorism Officers
  • Law Enforcement Personnel
  • Homeland Security Professionals
  • OSINT Analysts
  • Crisis Management Coordinators
  • Community Engagement Officers
  • Social Media Analysts
  • Behavioural and Forensic Psychologists
  • Defence and Security Consultants
  • Regional Policy Advisors
  • Military Personnel focusing on Southeast Asia
  • NGO Representatives working on Counter-Radicalisation
  •  
Trainer

About Our Expert Trainer:

Our trainer has more than 30 years of experience in Emergency Management, Security Counterterrorism with extensive operational and tactical background in high-level security operations, both regionally and internationally. He has also served as the Counter-Terrorist First Response Officer (and shift supervisor) at Sydney Airport from the 2000 Olympics.
He has conducted operational security and consulting contracts in conflict zones in the Middle East. He is also a veteran of both the Australian Defense Force (ADF) and the Australian Federal Police (AFP) 
Case Studies

Relevant case studies will be added to this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Advanced HUMINT and Tactical Interrogation Techniques

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Completion for participants upon request

What you will learn from this Masterclass:

In an increasingly complex and unpredictable world, intelligence professionals face evolving challenges, from counter-terrorism threats to the growing sophistication of criminal networks. Recent global incidents highlight the critical need for advanced HUMINT and interrogation techniques to uncover actionable intelligence swiftly and ethically.

This workshop addresses these challenges by equipping participants with the skills to navigate high-pressure situations, build trust in diverse cultural contexts, and handle resistant targets effectively. By focusing on real-world scenarios and ethical operations, this training prepares professionals to confront modern security threats head-on, making it an indispensable tool for those on the frontlines of global intelligence efforts.

  • GAIN advanced skills in HUMINT and tactical interrogation to excel in intelligence gathering and counter-terrorism operations.
  • LEARN practical, field-tested techniques through interactive drills, role-plays, and case studies from real operations.
  • MASTER ethical intelligence practices that build trust, ensure cultural sensitivity, and deliver results without coercion.
  • DEVELOP tools to handle resistant targets, leverage vulnerabilities, and extract actionable intelligence in high-stakes scenarios.
Who should attend

This training is ideal for professionals involved in countering radicalisation and extremism, including: 

  • Intelligence Officers
  • HUMINT Operatives
  • Counter-Terrorism Specialists
  • Security and Law Enforcement Personnel
  • Military Intelligence Analysts
  • Tactical Interrogators
  • Special Operations Forces (SOF) Personnel
  • Counterintelligence Agents
  • Criminal Investigators
  • Threat Assessment Analysts
  • Border Security Officers
  • Risk Management Professionals
  • National Security Advisors
Trainer

About Our Expert Trainer:

Our trainer has more than 30 years of experience in Emergency Management, Security Counterterrorism with extensive operational and tactical background in high-level security operations, both regionally and internationally. He has also served as the Counter-Terrorist First Response Officer (and shift supervisor) at Sydney Airport from the 2000 Olympics.
He has conducted operational security and consulting contracts in conflict zones in the Middle East. He is also a veteran of both the Australian Defense Force (ADF) and the Australian Federal Police (AFP) 
Case Studies

Relevant case studies will be added to this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Advanced OSINT Training for Law Enforcement

Overview

Highlights:

  • Intensive 3 day course
  • Certificate of Completion on request

What you will learn from this Masterclass:

This Advanced OSINT Training for Law Enforcement equips investigators with cutting edge open-source intelligence (OSINT) techniques to enhance digital investigations, intelligence gathering, and operational security. Designed for law enforcement agencies, this hands-on workshop covers advanced collection methods, social media exploitation, geospatial intelligence, and digital verification tools. Participants will learn to uncover hidden networks, track online threats, authenticate digital evidence, and conduct covert investigations while maintaining anonymity.

  • DEVELOP advanced OSINT skills to track criminal activities, uncover hidden networks, and collect actionable intelligence for law enforcement operations.
  • LEARN essential OPSEC techniques, including VPNs, sock puppets, and counter-surveillance methods, to conduct covert online investigations safely and effectively.
  • ACQUIRE techniques for metadata extraction, geolocation tracking, and source verification to counter misinformation and enhance case integrity.
  • STRUCTURE intelligence reports, conduct link analysis, and fuse OSINT with traditional intelligence disciplines (HUMINT, SIGINT, CYBINT) for more comprehensive investigations.
  • APPLY learned techniques in hands-on simulations, including suspect tracking, social media monitoring, and digital footprint analysis, to prepare for real-world law enforcement cases.
Who should attend
  • Law Enforcement & Intelligence Officers
  • Cybercrime Investigators
  • Digital Forensics Analysts
  • Counterterrorism Analysts
  • Criminal Intelligence Analysts
  • National Security Officers
  • Cyber Threat Intelligence Analysts
  • Undercover & Covert Operations Officers
  • Border Security & Immigration Officers
  • Financial Crime Investigators
  • Military Intelligence Personnel
  • Public Order & Riot Control Intelligence Officers
  • Interpol & International Law Enforcement Agents
  • Human Trafficking & Child Exploitation Investigators
  • Special Branch & Counter-Extremism Officers
Trainer

About our Expert Trainer

  • More than 25 Years in Intelligence & OSINT Operations
  • Delivered OSINT and intelligence training for military, police, and government bodies, including NATO, the United Nations, the UK Ministry of Defence, and foreign security agencies.
  • Specialist in Digital Investigations & Threat Analysis
  • Strategic Advisor on Intelligence & Security Operations
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive details about the venue closer to the date of the course. For more information, please contact us at: hello@q8asia.com.sg.

Brochure Download