Youth Offender Management and Behavioural Intervention

Overview

Highlights:

  • 3 day course
  • Certificate of Completion for participants upon request

What will you learn:

This two-day workshop equips practitioners with the knowledge and skills to manage youth offenders effectively, applying developmental, behavioural, and criminological perspectives.

  • Apply risk assessment tools and frameworks (RNR, Big Eight, GLM) to identify criminogenic needs and support prosocial development.
  • Design and implement intervention strategies using strengths-based, multisystemic, and family-focused approaches.
  • Manage challenging behaviour with de-escalation, active listening, and early-warning recognition techniques.
  • Translate theory into practice through case exercises, enabling evidence-based recommendations for youth pathways and reintegration.
Who should attend

This course is designed for:

  • Youth Probation / Case Officers
  • Social Workers / Counsellors
  • Juvenile Justice Programme Managers
  • Police Youth Officers / Community Safety Officers
  • Child Protection / Family Services Officers
  • Behavioural Intervention Specialists / Psychologists
  • Rehabilitation Programme Coordinators
  • Policy or Programme Analysts in youth justice or social services
Trainer

Our Expert Traineis the Founder & Director, ForenSights Pte Ltd Expert in Behavioural Science, Threat Assessment & Operational Psychology. She has more than 17 years of public service experience across MHA, SPF, and NCSS, specialising in forensic psychology, behavioural science, and operational risk.

A  former Principal Psychologist with the Police Psychological Services Department and crisis responder with the Police Crisis Negotiation Unit, where she handled high-risk suicide and barricade incidents.

Case Studies

Relevant case studies and examples will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course. For more information, email: hello@q8asia.com.sg

Brochure Download


Countering Domestic and Cross-Border Radicalisation Through PCAP and IPDR Intercept Data

Overview
Highlights:
  • 2 day course
  • Certificate of Completion for participants upon request

What will you learn:

This intensive two-day course equips participants with the technical, analytical, and legal skills to counter domestic and cross-border radicalisation using PCAP and IPDR intercept data.

  • Understand domestic and cross-border radicalisation pathways using real investigative models 
  • Correlate domestic and international digital footprints to uncover transnational networks 
  • Apply lawful intercept data within legal, ethical, and evidentiary frameworks 
  • Automate large-scale network analysis and intelligence reporting using AI-enabled workflows 
Who should attend

This course is ideal for:

  • Counter-Terrorism Officers 
  • Intelligence Analysts 
  • Law Enforcement Investigators 
  • Cybercrime & Digital Forensics Officers 
  • National Security & Homeland Security Personnel 
  • Military Intelligence Analysts 
  • Prosecutors and Legal Officers supporting security cases 
  • Regulatory and Government Analysts handling extremist threats 
Trainer

Our Expert Trainer has more than 40 years’ operational experience as a detective and communications data expert. He was formerly with the UK National Crime Agency (NCA), Metropolitan Police, and CEOP, supporting overt, covert, and major crime operations

A recognised OSINT and digital intelligence SME, specialising in device data, tracking, digital profiling, and complex investigations expert. Our trainer also serves as a trainer and advisor to UNODC, Council of Europe, EU cybercrime initiatives, UK College of Policing, and multiple international agencies .

Case Studies

Relevant case studies will be included as part of this course.

Partners

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course. For more information, email: hello@q8asia.com.sg

Brochure Download


Advanced OSINT: Operational Open-Source Intelligence for Threat, Risk and Investigations

Overview

Highlights:

  • 3 day course
  • Certificate of Completion upon request

What will you learn:

Modern threats rarely begin offline. Terror plots, cyber intrusions, organised crime, and influence operations often leave detectable digital traces long before escalation. This workshop prepares you to identify, validate, and act on those signals using real-world investigative scenarios.

  • Apply advanced OSINT techniques to support criminal, intelligence, and covert investigations 
  • Conduct secure, lawful, and anonymous online investigations in accordance with OPSEC requirements 
  • Identify suspects, associates, and networks through social media and digital footprint analysis 
  • Corroborate online information using image, document, and geolocation verification techniques 
Who should attend

This course is ideal for:

  • Intelligence Officers and Analysts 
  • Law Enforcement Investigators 
  • Security and Risk Management Professionals 
  • Cybercrime and Cybersecurity Analysts 
  • Military and Defence Personnel 
  • Regulatory, Compliance, and Enforcement Officers 
  • Strategic Communications and Information Operations Officers 
Trainer

Our Expert Trainer has more than 40 years’ operational experience as a detective and communications data expert. He was formerly with the UK National Crime Agency (NCA), Metropolitan Police, and CEOP, supporting overt, covert, and major crime operations . 

A recognised OSINT and digital intelligence SME, specialising in device data, tracking, digital profiling, and complex investigations expert. Our trainer also serves as a trainer and advisor to UNODC, Council of Europe, EU cybercrime initiatives, UK College of Policing, and multiple international agencies .

Case Studies

Relevant world applications and examples will be included for discussion throughout the course. 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, email: hello@q8asia.com.sg

Brochure Download


Turning Data into Decisions: Evidence-Based Approaches That Work

Overview

Highlights:

  • 2 day course
  • Certificate of Participation for participants upon request

What will you learn:

This two-day applied workshop equips public officers with the tools and techniques to apply Behavioural Insights (BI) in designing and evaluating policies, programmes, and public-facing initiatives.

  • Apply key BI frameworks (COM-B, EAST, MINDSPACE, Boosts, Sludge, etc.).
  • Identify behavioural bottlenecks in policy or operational challenges.
  • Design interventions using robust research and evaluation methodologies.
  • Analyse and interpret quantitative and qualitative data to assess intervention outcomes.
Who should attend

This course is ideal for:

  • Policy Officer / Policy Analyst
  • Behavioural Insights Specialist / Behavioural Scientist
  • Research Analyst / Data Analyst
  • Programme Manager / Project Lead
  • Communications Manager / Engagement Officer
  • Regulatory or Compliance Officer
  • Evaluation Specialist / Monitoring & Evaluation Officer
  • Public Sector Strategist / Governance Advisor
Trainer

Our Expert Trainer is the Founder & Director, ForenSights Pte Ltd Expert in Behavioural Science, Threat Assessment & Operational Psychology. She has more than 17 years of public service experience across MHA, SPF, and NCSS, specialising in forensic psychology, behavioural science, and operational risk.

A  former Principal Psychologist with the Police Psychological Services Department and crisis responder with the Police Crisis Negotiation Unit, where she handled high-risk suicide and barricade incidents.

Case Studies

Relevant case studies will be used to illustrate concepts covered in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, email: hello@q8asia.com.sg 

Brochure Download


AI in Due Diligence and Governance

Overview

Highlights:

  • 3 day course  
  • Certificate of Completion on request

What will you learn:

This workshop equips participants with both strategic understanding and hands-on experience in governing AI-enabled due diligence processes.  

  • Understand how AI is applied in due diligence, compliance, investigations, and risk assessment 
  • Learn how to identify and mitigate AI-related risks including bias, data privacy, cybersecurity, and regulatory exposure 
  • Apply AI tools to contract review, fraud detection, and third-party risk analysis 
  • Strengthen oversight of AI systems used by vendors, contractors, and internal teams 
  • Gain hands-on experience auditing and overseeing AI-enabled decision systems 
Who should attend

This workshop is designed for officers involved in oversight, governance, enforcement, and decision-making, including: 

  • Policy Officers & Regulators 
  • Compliance & Integrity Officers 
  • Internal Audit & Inspection Officers 
  • Investigations & Enforcement Officers 
  • Procurement & Vendor Management Officers 
  • Data Governance & Digital Transformation Leads 
  • Risk Management Officers 
  • Legal & Regulatory Affairs Officers 
  • Programme Managers overseeing AI-enabled systems 
  • Senior Officers responsible for oversight and accountability 
Trainer
Our Expert Trainer has more than 40 years’ operational experience as a detective and communications data expert. He was formerly with the UK National Crime Agency (NCA), Metropolitan Police, and CEOP, supporting overt, covert, and major crime operations.
 
A recognised OSINT and digital intelligence SME, specialising in device data, tracking, digital profiling, and complex investigations expert, our trainer also serves as a trainer and advisor to UNODC, Council of Europe, EU cybercrime initiatives, UK College of Policing, and multiple international agencies .
Case Studies

Relevant case studies will be added to this course

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course. For more information, email: hello@q8asia.com.sg

Brochure Download


Open Source Intelligence (OSINT) and Social Media Intelligence (SOCMINT)

Overview

Highlights:

  • 2 day course
  • Certificate of Completion upon request

What will you learn:

The understanding of human and social media intelligence is paramount in today’s intelligence led cyber investigations. Understanding the basics of OSINT and SOCMINT is key to identifying key targets in an investigation.

  • Learn  how to track and build up the  analysis of digital footprint from their human intelligence and online presence.
  • Master the latest and updated methods and tradecraft to proactive investigation.
  • Adopt the latest cutting-edge tools in relation to social media intelligence monitoring.
Who should attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officers
  • Security Researchers
Trainer
Our Expert Trainer has more than 40 years’ operational experience as a detective and communications data expert. He was formerly with the UK National Crime Agency (NCA), Metropolitan Police, and CEOP, supporting overt, covert, and major crime operations . 
 
A recognised OSINT and digital intelligence SME, specialising in device data, tracking, digital profiling, and complex investigations expert, our trainer also serves as a trainer and advisor to UNODC, Council of Europe, EU cybercrime initiatives, UK College of Policing, and multiple international agencies .
Case Studies

Real world applications and examples will be included as part of this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course. For more information, email: hello@q8asia.com.sg

Brochure Download


Advanced Intelligence Analysis Masterclass

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Participation upon request.

Intelligence analysis can provide insights into important questions (e.g. why and what happens next?). In the wake of recent events, identifying abstract relationships and asymmetrical threats that maybe easily overlooked. Participate in this Masterclass to master with necessary skills for Intelligence Analysis to produce accurate information to prevent future threats and keep possible threats from arising.

What you will learn in this Masterclass:

  • MASTER the methods and tools which are used in intelligence analysis.
  • DIFFERENTIATE the differences between information and intelligence.
  • APPLY critical thinking techniques to information to provide better understanding.
  • UNDERSTAND and apply the steps of the Intelligence Cycle.
  • USE and APPLY multiple intelligence sources to create credible reports
Who should attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Counter Intelligence Investigators
  • Cybercrime Intelligence Officers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer is an experienced intelligence professional, trainer, and consultant specialising in Open-Source Intelligence (OSINT), intelligence fusion, and strategic analysis. With over 25 years of service as a British Army Reserve officer in the Intelligence Corps, our trainer has worked extensively with government agencies, law enforcement, and security organisations worldwide, providing critical intelligence support and training.

Case Studies

Our trainer will use case studies to illustrate the different analytical techniques that are covered in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

Brochure Download


Introduction to Cyber Warfare and Operations Design (ICWOD)

Overview

This online course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn in this online course:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


Open Source Intelligence and Social Media Intelligence

Overview

Highlights:

  • 2-day masterclass
  • Certificate of Completion awarded on request

This masterclass is a fully interactive course that covers the best practices with using OSINT and SOCMINT tools during online investigations. The course will include slide presentations and demos by the trainer. As this is also a practical class, participants are required to bring along their own laptops for a 'hands-on' session.

What you will learn in this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer:

Our trainer is a globally recognised communications data expert, who works as an adviser, trainer and consultant to security services, government and police forces around the world. He has more than 38 years of experience as a detective, which includes experience gained working for the UK National Crime Agency (NCA), Metropolitan police, Child Exploitation and Online Exploitation (CEOP), and UK/US government agencies, in the capacity of overt, reactive and covert operations management.

Case Studies

Cases and examples, both current and historic will be added where relevant.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will take place in one of the hotel venues in Singapore. We will send more details to the participants upon registration or closer to the date of the event.

For more information, please contact: hello@q8asia.com.sg.

Brochure Download


Covert and Overt HUMINT: Source handling & tactical questioning

Overview

Highlights:

  • 2 day masterclass.
  • Certificate of Completion for participants upon request

What you will learn from this Masterclass:

This 2-day Covert & Overt HUMINT Workshop equips defence and security personnel in the SEA region with essential skills for human intelligence (HUMINT) operations.

  • DEVELOP a foundational understanding of Human Intelligence (HUMINT) operations.
  • DIFFERENTIATE between various types of HUMINT sources and collection methods.
  • APPLY effective debriefing, interviewing, and questioning techniques in operational environments.
  • UNDERSTAND the legal and ethical considerations surrounding HUMINT operations.
  • GAIN hands-on experience in covert source handling, both in physical and online environments.
Who should attend
  • Intelligence Officers
  • Special Operations Forces (SOF) Operators
  • Military Police Investigators
  • Psychological Operations (PSYOPS) Specialists
  • Counterintelligence Officers
  • Criminal Investigators & Detectives
  • Counterterrorism Officers
  • Undercover Operatives
  • Surveillance & Covert Operations Specialists
  • National Security Analysts
  • HUMINT Officers & Case Officers
  • Border Security & Immigration Officers
  • Cyber Intelligence Analysts (OSINT & SOCMINT)
  • Interrogators & Tactical Questioning Experts
  • Corporate Security Intelligence Analysts
  • Risk & Threat Assessment Specialists
  • Private Investigators & Security Consultants
Trainer

Our Expert Trainer is an experienced intelligence practitioner, with  eighteen years miliary knowledge and eight years national and international law enforcement skills.

Chris started his military career in the Royal Anglian Regiment, serving five years and gaining experience of resource management, combat and survival skills, risk management skills and a practical understanding of warfare. Deploying overseas, Chris gained a valuable insight into the role of NATO and international defence.

Perseus Intelligence was created from a passion for sharing knowledge and experience of intelligence, to support those who wish to pursue an exciting and rewarding career.

Case Studies

Where possible, relevant case studies will be added and discussed during this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about this course closer to the date of the course.

Brochure Download