Highlights:
- 3 day course
- Certificate of Completion upon request
What will you learn:
Modern threats rarely begin offline. Terror plots, cyber intrusions, organised crime, and influence operations often leave detectable digital traces long before escalation. This workshop prepares you to identify, validate, and act on those signals using real-world investigative scenarios.
- Apply advanced OSINT techniques to support criminal, intelligence, and covert investigations
- Conduct secure, lawful, and anonymous online investigations in accordance with OPSEC requirements
- Identify suspects, associates, and networks through social media and digital footprint analysis
- Corroborate online information using image, document, and geolocation verification techniques
This course is ideal for:
- Intelligence Officers and Analysts
- Law Enforcement Investigators
- Security and Risk Management Professionals
- Cybercrime and Cybersecurity Analysts
- Military and Defence Personnel
- Regulatory, Compliance, and Enforcement Officers
- Strategic Communications and Information Operations Officers
Our Expert Trainer has more than 40 years’ operational experience as a detective and communications data expert. He was formerly with the UK National Crime Agency (NCA), Metropolitan Police, and CEOP, supporting overt, covert, and major crime operations .
A recognised OSINT and digital intelligence SME, specialising in device data, tracking, digital profiling, and complex investigations expert. Our trainer also serves as a trainer and advisor to UNODC, Council of Europe, EU cybercrime initiatives, UK College of Policing, and multiple international agencies .
Relevant world applications and examples will be included for discussion throughout the course.
Interested to be part of this training?
Please contact us at hello@q8asia.com.sg to discuss your requirements.
Participants will receive more information about the venue closer to the date of the course.
For more information, email: hello@q8asia.com.sg

