Advanced OSINT: Operational Open-Source Intelligence for Threat, Risk and Investigations

Overview

Highlights:

  • 3 day course
  • Certificate of Completion upon request

What will you learn:

Modern threats rarely begin offline. Terror plots, cyber intrusions, organised crime, and influence operations often leave detectable digital traces long before escalation. This workshop prepares you to identify, validate, and act on those signals using real-world investigative scenarios.

  • Apply advanced OSINT techniques to support criminal, intelligence, and covert investigations 
  • Conduct secure, lawful, and anonymous online investigations in accordance with OPSEC requirements 
  • Identify suspects, associates, and networks through social media and digital footprint analysis 
  • Corroborate online information using image, document, and geolocation verification techniques 
Who should attend

This course is ideal for:

  • Intelligence Officers and Analysts 
  • Law Enforcement Investigators 
  • Security and Risk Management Professionals 
  • Cybercrime and Cybersecurity Analysts 
  • Military and Defence Personnel 
  • Regulatory, Compliance, and Enforcement Officers 
  • Strategic Communications and Information Operations Officers 
Trainer

Our Expert Trainer has more than 40 years’ operational experience as a detective and communications data expert. He was formerly with the UK National Crime Agency (NCA), Metropolitan Police, and CEOP, supporting overt, covert, and major crime operations . 

A recognised OSINT and digital intelligence SME, specialising in device data, tracking, digital profiling, and complex investigations expert. Our trainer also serves as a trainer and advisor to UNODC, Council of Europe, EU cybercrime initiatives, UK College of Policing, and multiple international agencies .

Case Studies

Relevant world applications and examples will be included for discussion throughout the course. 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, email: hello@q8asia.com.sg

Brochure Download


Turning Data into Decisions: Evidence-Based Approaches That Work

Overview

Highlights:

  • 2 day course
  • Certificate of Participation for participants upon request

What will you learn:

This two-day applied workshop equips public officers with the tools and techniques to apply Behavioural Insights (BI) in designing and evaluating policies, programmes, and public-facing initiatives.

  • Apply key BI frameworks (COM-B, EAST, MINDSPACE, Boosts, Sludge, etc.).
  • Identify behavioural bottlenecks in policy or operational challenges.
  • Design interventions using robust research and evaluation methodologies.
  • Analyse and interpret quantitative and qualitative data to assess intervention outcomes.
Who should attend

This course is ideal for:

  • Policy Officer / Policy Analyst
  • Behavioural Insights Specialist / Behavioural Scientist
  • Research Analyst / Data Analyst
  • Programme Manager / Project Lead
  • Communications Manager / Engagement Officer
  • Regulatory or Compliance Officer
  • Evaluation Specialist / Monitoring & Evaluation Officer
  • Public Sector Strategist / Governance Advisor
Trainer

Our Expert Trainer is the Founder & Director, ForenSights Pte Ltd Expert in Behavioural Science, Threat Assessment & Operational Psychology. She has more than 17 years of public service experience across MHA, SPF, and NCSS, specialising in forensic psychology, behavioural science, and operational risk.

A  former Principal Psychologist with the Police Psychological Services Department and crisis responder with the Police Crisis Negotiation Unit, where she handled high-risk suicide and barricade incidents.

Case Studies

Relevant case studies will be used to illustrate concepts covered in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, email: hello@q8asia.com.sg 

Brochure Download


Managing Radicalisation Risks in Prisons and Correctional Institutions

Overview

Highlights:

  • 2 day course
  • Certificate of Completion for participants upon request

What will you learn:

This two-day workshop examines how extremist ideologies take root, spread, and adapt within custodial environments, with a focus on detection, management, and intervention.

  • Differentiate between ideology-driven and identity-driven extremism within custodial settings
  • Learn how to recognise and disrupt extremist group dynamics, gang influence, and grievance networks
  • Apply behavioural and intelligence-led indicators to detect covert radicalisation activity
Who should attend

This course is designed for:

  • Correctional and prison officers involved in inmate management or security
  • Intelligence and security personnel supporting correctional institutions
  • Counter-terrorism and extremism prevention practitioners
  • Rehabilitation, psychology, and inmate engagement officers
  • Prison supervisors, managers, and policy planners
  • Law enforcement officers coordinating with correctional intelligence units
Trainer

Our Expert Trainer is an extremist turned undercover operative for the Canadian Security Intelligence Service(CSIS) & Royal Canadian Mounted Police (INSET), infiltrating extremist & terrorist cells. He is an expert in radicalisation, deradicalization, countering violent extremism(CVE), National security and counter-terrorism. He has also  testified as an expert to the United Nations Security Council, U.S. Senate Committee on Homeland Security, U.S. Special Operations Command, & numerous police & intelligence services around the world.

Our trainer is currently a Professor of Public Safety, Crime & Intelligence Analysis and co-author of the acclaimed book, "Undercover Jihadi".

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course. For more information, email: hello@q8asia.com.sg

Brochure Download


AI in Due Diligence and Governance

Overview

Highlights:

  • 3 day course  
  • Certificate of Completion on request

What will you learn:

This workshop equips participants with both strategic understanding and hands-on experience in governing AI-enabled due diligence processes.  

  • Understand how AI is applied in due diligence, compliance, investigations, and risk assessment 
  • Learn how to identify and mitigate AI-related risks including bias, data privacy, cybersecurity, and regulatory exposure 
  • Apply AI tools to contract review, fraud detection, and third-party risk analysis 
  • Strengthen oversight of AI systems used by vendors, contractors, and internal teams 
  • Gain hands-on experience auditing and overseeing AI-enabled decision systems 
Who should attend

This workshop is designed for officers involved in oversight, governance, enforcement, and decision-making, including: 

  • Policy Officers & Regulators 
  • Compliance & Integrity Officers 
  • Internal Audit & Inspection Officers 
  • Investigations & Enforcement Officers 
  • Procurement & Vendor Management Officers 
  • Data Governance & Digital Transformation Leads 
  • Risk Management Officers 
  • Legal & Regulatory Affairs Officers 
  • Programme Managers overseeing AI-enabled systems 
  • Senior Officers responsible for oversight and accountability 
Trainer
Our Expert Trainer has more than 40 years’ operational experience as a detective and communications data expert. He was formerly with the UK National Crime Agency (NCA), Metropolitan Police, and CEOP, supporting overt, covert, and major crime operations.
 
A recognised OSINT and digital intelligence SME, specialising in device data, tracking, digital profiling, and complex investigations expert, our trainer also serves as a trainer and advisor to UNODC, Council of Europe, EU cybercrime initiatives, UK College of Policing, and multiple international agencies .
Case Studies

Relevant case studies will be added to this course

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course. For more information, email: hello@q8asia.com.sg

Brochure Download


Open Source Intelligence (OSINT) and Social Media Intelligence (SOCMINT)

Overview

Highlights:

  • 2 day course
  • Certificate of Completion upon request

What will you learn:

The understanding of human and social media intelligence is paramount in today’s intelligence led cyber investigations. Understanding the basics of OSINT and SOCMINT is key to identifying key targets in an investigation.

  • Learn  how to track and build up the  analysis of digital footprint from their human intelligence and online presence.
  • Master the latest and updated methods and tradecraft to proactive investigation.
  • Adopt the latest cutting-edge tools in relation to social media intelligence monitoring.
Who should attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officers
  • Security Researchers
Trainer
Our Expert Trainer has more than 40 years’ operational experience as a detective and communications data expert. He was formerly with the UK National Crime Agency (NCA), Metropolitan Police, and CEOP, supporting overt, covert, and major crime operations . 
 
A recognised OSINT and digital intelligence SME, specialising in device data, tracking, digital profiling, and complex investigations expert, our trainer also serves as a trainer and advisor to UNODC, Council of Europe, EU cybercrime initiatives, UK College of Policing, and multiple international agencies .
Case Studies

Real world applications and examples will be included as part of this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course. For more information, email: hello@q8asia.com.sg

Brochure Download


Building Organisational Resilience Against Manipulation and Misinformation

Overview

Highlights:

  • 2 day course
  • Certificate of Completion for participants upon request

What will you learn:

This course equips participants with a deep understanding of how manipulation works, why people fall for it, and how to respond effectively at both personal and organisational levels.

  • Identify common manipulation and influence tactics used in scams, fraud, and misinformation.
  • Recognise the psychological and cognitive biases—including persuasion tactics, complacency, and authority influence—that increase individual vulnerability.
  • Strengthen personal resilience by building habits that resist pressure, emotional triggers, and undue influence.
  • Evaluate organisational exposure using the Organisational Vulnerability Assessment, identifying gaps in governance, processes, culture, and technical defences.
Who should attend

This course is ideal for:

  • Risk Managers / Risk Officers
  • Compliance Officers / Compliance Managers
  • Internal Audit Officer / Audit Managers
  • Human Resources Managers / HR Officers
  • Communications Managers / Corporate Communications Officers
  • Security Managers / Security Officers
  • Fraud Prevention Officers / Fraud Analysts
  • IT Security / Cybersecurity Specialists
  • Operations Managers / Team Leaders
  • Public Sector Officers / Policy Implementation Officers
Trainer

Our Expert Trainer is the Founder & Director, ForenSights Pte Ltd Expert in Behavioural Science, Threat Assessment & Operational Psychology. She has more than 17 years of public service experience across MHA, SPF, and NCSS, specialising in forensic psychology, behavioural science, and operational risk.

A  former Principal Psychologist with the Police Psychological Services Department and crisis responder with the Police Crisis Negotiation Unit, where she handled high-risk suicide and barricade incidents.

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Human Intelligence and Covert Human Intelligence Source

Overview

Highlights:

  • 2 day course
  • Certificate of Completion for participants upon request

What will you learn:

This intensive two-day workshop provides participants with a practical understanding of Human Intelligence (HUMINT) and Covert Human Intelligence Sources (CHIS) within contemporary security and law enforcement environments.

  • Define  and contextualise HUMINT and CHIS within the intelligence cycle and contemporary threat environments
  • Differentiate between overt, covert, and clandestine human intelligence collection methods
  • Identify and assess human source types, motivations, and vulnerabilities using recognised analytical frameworks (e.g. MICE)
Who should attend

This course is designed for:

  • Correctional and prison officers involved in inmate management or security
  • Intelligence and security personnel supporting correctional institutions
  • Counter-terrorism and extremism prevention practitioners
  • Rehabilitation, psychology, and inmate engagement officers
  • Prison supervisors, managers, and policy planners
  • Law enforcement officers coordinating with correctional intelligence units
Trainer

Our Expert Trainer is an undercover operative for the Canadian Security Intelligence Service(CSIS) & Royal Canadian Mounted Police (INSET), infiltrating extremist & terrorist cells. He is an expert in radicalisation, deradicalization, countering violent extremism(CVE), National security and counter-terrorism. He has also  testified as an expert to the United Nations Security Council, U.S. Senate Committee on Homeland Security, U.S. Special Operations Command, & numerous police & intelligence services around the world.

Our trainer is currently a Professor of Public Safety, Crime & Intelligence Analysis and co-author of the acclaimed book, "Undercover Jihadi".

Case Studies

Relevant case studies will be included as part of this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Advanced Intelligence Analysis Masterclass

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Participation upon request.

Intelligence analysis can provide insights into important questions (e.g. why and what happens next?). In the wake of recent events, identifying abstract relationships and asymmetrical threats that maybe easily overlooked. Participate in this Masterclass to master with necessary skills for Intelligence Analysis to produce accurate information to prevent future threats and keep possible threats from arising.

What you will learn in this Masterclass:

  • MASTER the methods and tools which are used in intelligence analysis.
  • DIFFERENTIATE the differences between information and intelligence.
  • APPLY critical thinking techniques to information to provide better understanding.
  • UNDERSTAND and apply the steps of the Intelligence Cycle.
  • USE and APPLY multiple intelligence sources to create credible reports
Who should attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Counter Intelligence Investigators
  • Cybercrime Intelligence Officers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer is an experienced intelligence professional, trainer, and consultant specialising in Open-Source Intelligence (OSINT), intelligence fusion, and strategic analysis. With over 25 years of service as a British Army Reserve officer in the Intelligence Corps, our trainer has worked extensively with government agencies, law enforcement, and security organisations worldwide, providing critical intelligence support and training.

Case Studies

Our trainer will use case studies to illustrate the different analytical techniques that are covered in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

Brochure Download


Radicalisation Through Conspiracy Theories and Misinformation

Overview

Highlights:

  • 2 day masterclass
  • Certificate of Completion for participants upon request

What you will learn in this Masterclass:

This 2-day course, with its focus on Asia, explores the tools that can be used to detect, disrupt, and respond to radicalisation pathways that are driven by online conspiracy narratives.

  • IDENTIFY key types of misinformation, disinformation, and conspiracy narratives relevant to Asia
  • ANALYSE how social media algorithms fuel extremist mobilisation
  • RECOGNISE early warning signs of radicalisation through digital footprints and behaviour patterns
  • EXAMINE real Southeast Asian case studies to extract radicalisation trends
  • UNDERSTAND the psychology and vulnerabilities that make individuals—especially youths susceptible
  • APPLY intervention strategies suited to the Asian context
  • ASSESS operational challenges such as platform moderation limits and evasion tactics
  • DEVELOP counter-messaging and digital literacy campaigns for targeted audiences
  • CREATE agency-specific action plans to detect, disrupt, and prevent extremist threats
Who should attend
  • Law enforcement officers involved in intelligence, investigations, or community policing
  • Counter-terrorism and homeland security personnel
  • Cybercrime and digital forensics units
  • Analysts monitoring extremist content and online threats
  • Officers engaged in youth outreach and prevention programs
  • Security and intelligence planners in government agencies
Trainer

About Our Expert Trainer:

  • A former extremist turned undercover operative for the Canadian Security Intelligence Service(CSIS) & Royal Canadian Mounted Police (INSET), infiltrating extremist & terrorist cells.
  • An Expert in radicalisation, deradicalization, countering violent extremism(CVE), National security and counter-terrorism.
  • He testified as an expert to the United Nations Security Council, U.S. Senate Committee on Homeland Security, U.S. Special Operations Command, & numerous police & intelligence services around the world.
  • Currently a Professor of Public Safety, Crime & Intelligence Analysis
  • Co-author of the acclaimed book, "Undercover Jihadi".
Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Covert and Overt HUMINT: Source handling & tactical questioning

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Completion for participants upon request

What you will learn from this Masterclass:

This 2-day Covert & Overt HUMINT Workshop equips defence and security personnel in the SEA region with essential skills for human intelligence (HUMINT) operations.

  • DEVELOP a foundational understanding of Human Intelligence (HUMINT) operations.
  • DIFFERENTIATE between various types of HUMINT sources and collection methods.
  • APPLY effective debriefing, interviewing, and questioning techniques in operational environments.
  • UNDERSTAND the legal and ethical considerations surrounding HUMINT operations.
  • GAIN hands-on experience in covert source handling, both in physical and online environments.
Who should attend
  • Intelligence Officers
  • Special Operations Forces (SOF) Operators
  • Military Police Investigators
  • Psychological Operations (PSYOPS) Specialists
  • Counterintelligence Officers
  • Criminal Investigators & Detectives
  • Counterterrorism Officers
  • Undercover Operatives
  • Surveillance & Covert Operations Specialists
  • National Security Analysts
  • HUMINT Officers & Case Officers
  • Border Security & Immigration Officers
  • Cyber Intelligence Analysts (OSINT & SOCMINT)
  • Interrogators & Tactical Questioning Experts
  • Corporate Security Intelligence Analysts
  • Risk & Threat Assessment Specialists
  • Private Investigators & Security Consultants
Trainer

Our Expert Trainer is an experienced intelligence practitioner, with  eighteen years miliary knowledge and eight years national and international law enforcement skills.

Chris started his military career in the Royal Anglian Regiment, serving five years and gaining experience of resource management, combat and survival skills, risk management skills and a practical understanding of warfare. Deploying overseas, Chris gained a valuable insight into the role of NATO and international defence.

Perseus Intelligence was created from a passion for sharing knowledge and experience of intelligence, to support those who wish to pursue an exciting and rewarding career.

Case Studies

Where possible, relevant case studies will be added and discussed during this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about this course closer to the date of the course.

Brochure Download