Chemical, Biological, Radiological and Nuclear [CBRN] Crisis Response

Overview

Highlights:

  • Intensive 12-Hour Course
  • Certificate of Completion

What you will learn from this Masterclass:

  • UNDERSTAND the CBRN threat, its effect and impact, and the consequence of a poor response to the threat. 
  • UTILISE lateral thinking to understand the threat from the instigator’s perspective, how it may occur, and the intent behind the actions, so that risk mitigation and the subsequent response is effectively enabled.  
  • APPLY effective risk management to the identified threat, and to the initial and subsequent response and recovery. 
  • IDENTIFY weaknesses in counter-CBRN response by understanding the effectiveness of capabilities to then identify gaps in key development programmes. 
  • MEASURE your current response against international standards and against emerging thinking on the ability to mitigate and respond to CBRN threats and hazards. 
  • ASSESS your, and your organisation’s, perception of the CBRN threat, and apply learning to enhance your preparedness to address CBRN threats and hazards. 
  • COMMENCE production, or revision, of your organisational counter-CBRN risk-based response plans. 
Who should attend
  • Strategic Directors and Leaders with responsibility for effective outcomes 
  • Tactical planners with responsibility for effective response plans 
  • Command, Control and Coordination role holders 
  • Risk managers 
  • LE Investigators 
  • Military Intelligence Specialists 
  • LE and Intelligence Analysts; 
  • National Security Analysts 
  • Policy Managers 
  • Diplomats 
  • Liaison Officers 
  • Crisis Communications and PR Departments 
  • CBRN responders 
Trainer

In his current role, our Expert Trainer is at the forefront of international efforts to combat chemical, biological, radiological, and nuclear (CBRN) threats. He is engaged with the Organisation for the Prohibition of Chemical Weapons (OPCW), collaborating with national and international governments across regions as diverse as ASEAN, the Balkans, Africa, and the Caribbean. His work involves developing and planning CBRN counter-terrorism capabilities, contributing to global security. 

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and
relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Human Intelligence Tradecraft & Covert Human Intelligence Source

Overview

Highlights:

  • Intensive 12-Hour Course
  • Certificate of Completion

What you will learn from this Masterclass:

  • MASTER the HUMINT spectrum, covering various sources of information and engagement strategies. 
  • LEARN when and how to use different types of engagement, from introductions to complex debriefs, for maximum effectiveness. 
  • DEVELOP the skills to identify and assess Subjects of Interest (SOIs) within target networks. 
  • ANALYSE the investigation need, tasking requests, and intelligence gaps to create a focused collection strategy. 
  • ACQUIRE tactics for building rapport and eliciting information effectively, while remaining sensitive to emotional states. 
  • UNDERSTAND holistic approaches to information elicitation, including active listening and information gap identification. 
  • LEARN how to create intelligence reports that maintain source protection and accurately differentiate between facts, suppositions, and source comments. 
Who should attend
  • Military Intelligence Officers 
  • Special Operations Forces (SOF) Personnel 
  • Intelligence Analysts 
  • Counterintelligence Agents 
  • Police Detectives 
  • Security Directors 
  • Risk Assessment Specialists 
  • Security Consultants 
  • National Security Analysts 
  • Corporate Security Managers 
  • Homeland Security Officials 
  • Diplomatic Security Officers 
  • Private Investigators 
  • Crisis Response Coordinators 
  • Security Operations Managers 
  • Border Patrol Agents 
  • Emergency Response Team Leaders 
  • Threat Assessment Analysts 
  • Counterterrorism Analysts 
  • Surveillance Specialists 
Trainer

Our Expert Trainer has completed 23 years in the British Army Intelligence Corps working in various fields including Counter Intelligence, Technical Investigations, Information Assurance, HUMINT IMINT and Cyber Security.

He developed an OSINT course to train other investigators and intelligence analysts in researching using the internet and doing it safely and anonymously.  He has worked in mainland Europe, the Middle East and West Africa and currently teaches OSINT techniques to military staff across the 27 NATO nations and defence industry partners.

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and
relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This masterclass will be held at Orchard Hotel Singapore. 

For more information, write to hello@q8asia.com.sg

Brochure Download


[Expert-Led Masterclass] Intelligence Gathering & Report Creation for Investigations

Overview

Protecting the integrity of a real-world exhibit is easy and straightforward. Applying the same level of procedure to a non-tangible item, such as a screenshot, is much harder. This course will allow you to achieve this level of protection against scrutiny, which is essential if the report will be used to support action against a member of staff, evidence against a threat actor or subject, or support of a case, arrest, or warrant in court.  

This masterclass includes hands-on interactive activities. Participants are encouraged to bring along their laptop to participate in the activities.

What you will learn from this Masterclass:

  • AWARENESS around investigative reports to a high standard that will stand rigorous scrutiny by another party or court. 
  • MASTER the latest and updated methods and tradecraft to protect digital intelligence gathered and ‘seal’ it in a virtual evidence bag, to prove integrity and honesty on the part of the investigator.  
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring. 
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations and avoid pitfalls and scrutiny. 
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations by converting non tangible data and intelligence into evidential matter. 
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence. 
Who should attend

Military, government and police investigators with the following job titles: 

  • Counterintelligence Investigators 
  • Cybercrime Intelligence Officers 
  • Digital Media Examination and Device Investigators 
  • Intelligence Analysts 
  • Intelligence Collection Managers 
  • Law Enforcement Investigators 
  • Military Intelligence Officer 

Private sector: 

  • Investigative journalists 
  • Private investigators 
  • Counter corruption investigators 
  • Corporate intelligence analysts, for due diligence and organisational security 
  • Security Researchers 
Trainer

Our Expert Trainer is a pioneer in Open-Source Intelligence Analysis and Investigations and App Developer. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep websources.

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More details will be sent to the participants closer to the date of this course.

For more information, please contact: hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Cyber Warfare and Operations Design

Overview

This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn from this Masterclass:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


[Expert-Led Masterclass] Open Source and Social Media Intelligence

Overview

Highlights:

  • In-person masterclass that is taking place in Kuala Lumpur, Malaysia.

This masterclass is a full hands-on interactive course where the methodology and best practice is explained, and then the students practice the tradecraft live and online. Please be advised that this course is almost 50% practical workshops and exercises, so your own laptop is essential. The course will be a presentation and demonstration of the techniques. Students are encouraged to follow along during the course on the own laptop.

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer is a globally recognised communications data expert, who works as an adviser, trainer and consultant to security services, government and police forces around the world.

His experience, and USP, is based on 38 years as a detective, which includes experience gained working for the UK National Crime Agency (NCA), Metropolitan police, Child Exploitation and Online Exploitation (CEOP), and UK/US government agencies, in the capacity of overt, reactive and covert operations management.

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and
relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will take place in Kuala Lumpur. We will send more details to the participants upon registration or closer to the date of the event.

For more information, please contact: hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Digital Surveillance Techniques Course

Overview

Highlights:

  • Intensive 12-Hour Course
  • Remote Access
  • More than 12 hours of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence of individuals through digital shadow.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to Crime group intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet and encrypted channels and hidden chat rooms.
  • STRENGTHEN investigative skills to meet to combat the ever increasing problem of encryption.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples and practical exercises will be conducted throughout this 2-day course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely. Our onboarding package will ensure a smooth learning experience.
Not to worry, we're ready to answer any questions, reach us at hello@q8asia.com.sg.

Brochure Download


[Expert-Led Masterclass] Real World Surveillance Techniques Course

Overview

Highlights:

  • Certificate of Completion

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence of individuals through digital shadow.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to Crime group intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet and encrypted channels and hidden chat rooms.
  • STRENGTHEN investigative skills to meet to combat the ever increasing problem of encryption.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples and practical exercises will be conducted throughout this 2-day course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This in-person Masterclass will be held at Orchard Hotel Singapore. Participants will receive more information closer to the date of the class. For more information, please email us at hello@q8asia.com.sg.

Brochure Download


[Expert Led Digital Masterclass] Cyber Warfare and Operations Design

Overview

This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn from this Masterclass:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


[Expert Led Digital Masterclass] The Intelligence Cycle [Fundamentals course]

Overview

This four half-day interactive, detailed and practical workshop will provide the students a solid understanding of the Intelligence Cycle, so that they can apply it in a practical setting. The course will develop the students understanding of the various stages of the Intelligence Cycle – exploring in depth, Direction, Collection, Processing and Dissemination. The course will explore various intelligence collection disciplines, introducing the participants to new concepts for exploitation.

  • Learn the four phases of the Intelligence Cycle and how they function together.
  • Understand the roles and responsibilities of intelligence analysts and officers in the role of the Intelligence Cycle.
  • Develop your understanding of intelligence collection disciplines.
  • Learn and practice valuable processes such as developing intelligence collection plans.
Who should attend
  • The workshop is designed for a range of specialists from across the intelligence community, private sector, Government, Military and Law Enforcement specialists, and those wanting to expand their understanding of the role of intelligence analysts and officers in their field.

    • Law enforcement intelligence specialists
    • Military intelligence specialists
    • Government intelligence specialists
    • Intelligence specialists, officers and analysts
    • Private sector intelligence specialists – for example, those engaged in oil and gas exploration, risk management and security
    • Risk management professionals
    • Those interested in the intelligence community and the role of intelligence in decision-making
Trainer

Our Expert Facilitator

Chris Proops LLB (Hons) PgDip VR is an experienced intelligence practitioner, with  eighteen years miliary knowledge and eight years national and international law enforcement skills.

Chris started his military career in the Royal Anglian Regiment, serving five years and gaining experience of resource management, combat and survival skills, risk management skills and a practical understanding of warfare. Deploying overseas, Chris gained a valuable insight into the role of NATO and international defence.

Perseus Intelligence was created from a passion for sharing knowledge and experience of intelligence, to support those who wish to pursue an exciting and rewarding career. 

Case Studies

Where possible, our facilitator will add relevant case studies during this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about this online course closer to the date of the course.

Brochure Download


[Expert-Led Digital Masterclass] Digital Surveillance Techniques Course

Overview

Highlights:

  • Intensive 12-Hour Course
  • Remote Access
  • More than 12 hours of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence of individuals through digital shadow.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to Crime group intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet and encrypted channels and hidden chat rooms.
  • STRENGTHEN investigative skills to meet to combat the ever increasing problem of encryption.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples and practical exercises will be conducted throughout this 2-day course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely. Our onboarding package will ensure a smooth learning experience.
Not to worry, we're ready to answer any questions, reach us at hello@q8asia.com.sg.

Brochure Download