[Expert Led Digital Masterclass] Cyber Warfare and Operations Design

Overview

This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn from this Masterclass:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


[Expert Led Digital Masterclass] Cyber Warfare and Operations Design

Overview

This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn from this Masterclass:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


[Expert Led Masterclass] Mastering Video Surveillance Systems

Overview

Gain invaluable insights into the latest advancements in VSS technology, including camera types, video analytics, and situational awareness in this masterclass.  Apply what you learned from real-world scenarios and VSS techniques to detect and prevent intrusions, monitor critical areas, and responding effectively to incidents. 

Equip yourself with the knowledge and skills to design and implement cutting-edge VSS solutions that address the evolving security landscape.

  • UNDERSTAND the intention and elements of Video Surveillance Systems (VSS), including situational awareness, intrusion detection, life-safety elements, and the impact of artificial intelligence.
  • MASTER VSS and security network design considerations, such as bandwidth, cabling options, power requirements, equipment location, data storage, and information security.
  • EXPLORE coverage zone planning to meet operational requirements.
  • DETERMINE system requirements based on operational needs, including resolution, lighting, and analytics requirements.
  • IDENTIFY layout and location planning considerations, including environmental factors and accessibility.
  • DESIGN monitoring and control locations, considering incident response and ergonomic factors.
  • LEARN about post-incident analysis using recorded footage features.
  • GAIN INSIGHTS into stakeholder requirements and operational considerations that inform system specifications.
Who will attend

The workshop is ideal for security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users, including:

  • Business continuity, crisis response and strategic risk managers
  • Facilities management managers
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Strategic planners & managers
Trainer

Our Expert Trainer is a skilled security system professional with over 15 years of security system design and implementation experience in various sectors, including expansive public realm systems, high value office and museum developments as well as government and military systems. 

He is fully versed in current security technologies and developments of such systems, capable of designing systems of various complexities and providing information of suitable quality for the whole design process, from concept through to construction level information.

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


[Expert Led Masterclass] Security Design for Critical Infrastructures & Public Spaces

Overview

This two-day in-depth and hands-on workshop designed to equip you with the essential expertise, knowledge, and strategies for designing foolproof security systems. 

Tailored for those involved in the construction of critical infrastructures and public spaces, you will gain timely insights and practical strategies to effectively safeguard these vital assets.

  • DETERMINE the evidence required to demonstrate security.
  • UNDERSTAND of the Security Management approach to safeguard assets and business processes.
  • INSIGHTS into different modes of operation and their impact on security.
  • IDENTIFY of how facility surroundings can affect security.
  • DEFINE user groups and their security needs.
  • KNOWLEDGE of facility security constraints and objectives.
  • APPLY Operational Requirements (ORs) to inform security system requirements.
  • GAIN AWARENESS of the security risks associated with critical infrastructures and public spaces.
Who will attend

The workshop is ideal for security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users, including:

  • Business continuity, crisis response and strategic risk managers
  • Facilities management managers
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Strategic planners & managers

Professionals from the following sectors:

  • Airport, ports, rail
  • Diplomatic service
  • Education institutions & schools
  • Financial institutions & data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & border control
  • Oil & gas infrastructure
  • Power plant and public utilities
  • Retail, sports and hospitality sectors
Trainer

Expert Trainer has 24 years of experience in security related field. A Chartered Security Professional, he is a member of Lead writing team for ASIS International Physical Assets Protection Standard. He has designed security for the London 2012 Olympic Games Main Stadium, which was the
first stadium to achieve a Secured by Design award.

 

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


[Expert-Led Masterclass] C-IEDs in Today’s Terror Threat Environment

Overview

This Digital-led Expert Masterclass is designed to equip delegates to gain a strategic understanding on IED’s, IED attacks and how to firstly prevent and minimise risk of attack and secondly to help deal with an attack should the worse happen. The workshop will also explore methods of information gathering and the importance of information sharing and reporting when attacks occur.

What you will learn from this Masterclass:

  • IDENTIFY technologies involved in C-IED and methods of employment.
  • UNDERSTAND the key C-IED activities of, predict, pursue, prevent, detect, neutralise, mitigate, and exploit.
  • DIFFERENTIATE and UNDERSTAND roles and responsibilities of staff, managers and law enforcement or authorities.
  • RECOGNISE the importance of Information Management/Exchange in its effectiveness at all levels.
  • CREATE general awareness of signs and indicators and best practice.
  • MASTER the tactics, techniques and procedures used to counter the threat they present.
Who will attend
  • Chief Operations Officers (COO)
  • Chief Security Officers (CSO)
  • Chief Strategy Officers
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Directors and/or Managers
  • Risk Managers and/or Directors
  • Security Director and/or Manager
  • Security Supervisor Vice President and/or Director of Security
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents. Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
Trainer

Our Expert Trainer has 30 years’ experience in both military and civilian, in the safe handling, storage, movement use, and disposal of explosives and associated hazardous substances. He has extensive experience of IEDD, Explosive Ordnance Disposal (EOD) and Conventional Munitions Disposal (CMD) operations.

He is an accomplished Training leader and has trained or over seen the training of over 2000 students in Afghanistan, Libya, Kenya, Ethiopia, Iceland, USA, Poland, Sweden, and Germany.

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More details of the venue will be sent to the participants closer to the date of the event.

For more information, contact: 
hello@q8asia.com.sg.

Brochure Download


[Expert-Led Masterclass] Hostage & Crisis Negotiation Techniques

Overview

Highlights:

  • Intensive 3 day course
  • Certificate of Completion

What you will learn from this Masterclass:

  • LEARN the qualities and skills necessary to excel as a crisis negotiator in high-stakes situations. 
  • DEVELOP effective strategies for preparing and responding to crisis negotiations.
  • UNDERSTAND the different phases of negotiation and how to navigate them successfully.
  • IDENTIFY and ADAPT to various personality types to enhance negotiation outcomes.
  • MASTER advanced communication techniques, including active listening, empathy, and non-verbal strategies.
  • BUILD rapport, trust, and credibility in high-pressure environments.
  • DEVELOP strategies to overcome obstacles and challenges in each negotiation phase.
  • ACQUIRE practical experience through role-playing exercises in a safe and controlled environment
  •  
Who will attend

Professionals working in law enforcement, crisis system management, hostage negotiation and disaster management with the following job titles: 

  • Hostage negotiator 
  • Homeland security officer 
  • Public safety officer 
  • Mediator 
  • Director of operations and security   
  • Crisis consultant  
Trainer

About the Expert Trainer

  • International renowned Hostage Negotiator and Crisis Management Trainer. 
  • Experience in over 250 domestic kidnap and critical incidents and has actively negotiated for over 300 hours. 
  • Decorated by the late Queen Elizabeth II for 32 years service to policing, deployments as an International hostage negotiator. 
Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

We will be in touch with more information about the venue closer to the date of the Masterclass. For more information, contact us: hello@q8asia.com.sg.

Brochure Download


[Expert Led Digital Masterclass] Cyber Warfare and Operations Design

Overview

This course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn from this Masterclass:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


[Expert-Led Masterclass] Tactical Man Tracking for Law Enforcement & Military

Overview

Highlights:

  • Intensive 3 day class 
  • Certificate of Completion for particpants

What you will learn from this Masterclass:

  • ENHANCE situational awareness by learning tracking terminology, basic techniques, and tracking indicators, attendees can better understand their surroundings and identify potential threats.
  • IMPROVE tracking skills through the understanding of dynamics of a footprint, lost spoor procedures, assessing the age of spoor, and anti-tracking/counter-tracking techniques.
  • LEARN about the roles of the tracking team and tracking team formations, enabling attendees to operate effectively in a team setting.
  • UNDERSTAND the rules of tracking and applying them in real-life scenarios, as demonstrated through case studies.
  • EQUIP law enforcement professionals with essential skills that can help improve their effectiveness in the field and enhance their safety and that of the public.
Who will attend
  • Police Officers and Detectives
  • K9 Unit Officers and Handlers
  • Tactical Response Team (SWAT) Members
  • Corrections Officers and Supervisors
  • Border Patrol Agents and Supervisors
  • Search and Rescue Personnel and Volunteers
  • Military Personnel, including Special Operations Forces
  • Executive Protection Agents and Bodyguards

and other law enforcement and security professionals who would benefit from attending a Tactical Tracking course, depending on their specific roles and responsibilities.

Trainer

Our Expert Trainer is the CEO & Operations/Training Director for the Scott Donelan Tracking School with

  • Over 26 years of experience in Tactical Tracking
  • Experienced in planning and conducting all tactical and non-tactical operations in both rural and urban environments 
  • Experienced instructor in classes for Law Enforcement and Military personnel throughout the United States and globally.
Case Studies

Relevant case studies and examples will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This in-person Masterclass will be held in Singapore. Participants will receive more information closer to the date of the course.

For more information, please contact us at: hello@q8asia.com.sg.

Brochure Download


[Expert-Led Masterclass] Open Source and Social Media Intelligence

Overview

Highlights:

  • In-person masterclass that is taking place in Kuala Lumpur, Malaysia.

This masterclass is a full hands-on interactive course where the methodology and best practice is explained, and then the students practice the tradecraft live and online. Please be advised that this course is almost 50% practical workshops and exercises, so your own laptop is essential. The course will be a presentation and demonstration of the techniques. Students are encouraged to follow along during the course on the own laptop.

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer is a globally recognised communications data expert, who works as an adviser, trainer and consultant to security services, government and police forces around the world.

His experience, and USP, is based on 38 years as a detective, which includes experience gained working for the UK National Crime Agency (NCA), Metropolitan police, Child Exploitation and Online Exploitation (CEOP), and UK/US government agencies, in the capacity of overt, reactive and covert operations management.

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and
relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will take place in Kuala Lumpur. We will send more details to the participants upon registration or closer to the date of the event.

For more information, please contact: hello@q8asia.com.sg.

Brochure Download


[Expert-Led Masterclass] Intelligence Gathering & Report Creation for Investigations

Overview

Protecting the integrity of a real-world exhibit is easy and straightforward. Applying the same level of procedure to a non-tangible item, such as a screenshot, is much harder. This course will allow you to achieve this level of protection against scrutiny, which is essential if the report will be used to support action against a member of staff, evidence against a threat actor or subject, or support of a case, arrest, or warrant in court.  

This masterclass includes hands-on interactive activities. Participants are encouraged to bring along their laptop to participate in the activities.

What you will learn from this Masterclass:

  • AWARENESS around investigative reports to a high standard that will stand rigorous scrutiny by another party or court. 
  • MASTER the latest and updated methods and tradecraft to protect digital intelligence gathered and ‘seal’ it in a virtual evidence bag, to prove integrity and honesty on the part of the investigator.  
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring. 
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations and avoid pitfalls and scrutiny. 
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations by converting non tangible data and intelligence into evidential matter. 
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence. 
Who should attend

Military, government and police investigators with the following job titles: 

  • Counterintelligence Investigators 
  • Cybercrime Intelligence Officers 
  • Digital Media Examination and Device Investigators 
  • Intelligence Analysts 
  • Intelligence Collection Managers 
  • Law Enforcement Investigators 
  • Military Intelligence Officer 

Private sector: 

  • Investigative journalists 
  • Private investigators 
  • Counter corruption investigators 
  • Corporate intelligence analysts, for due diligence and organisational security 
  • Security Researchers 
Trainer

Our Expert Trainer is a globally recognised communications data expert, who works as an adviser, trainer and consultant to security services, government and police forces around the world.

His experience, and USP, is based on 38 years as a detective, which includes experience gained working for the UK National Crime Agency (NCA), Metropolitan police, Child Exploitation and Online Exploitation (CEOP), and UK/US government agencies, in the capacity of overt, reactive and covert operations management.

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More details will be sent to the participants about this online class.

For more information, please contact: hello@q8asia.com.sg.

Brochure Download