Advanced Open Source Intelligence & Social Media Intelligence

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who should attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples will be included as part of this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Covert Surveillance and Intelligence Techniques in the Digital Era

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

In today's digital era, it's crucial for intelligence professionals to stay abreast of advanced covert surveillance techniques. The global connectivity of the digital age also underscores the need for comprehensive surveillance strategies that can operate seamlessly across diverse digital landscapes. By emphasising operational security, data privacy, and ethical considerations, the workshop ensures that participants are equipped to conduct surveillance activities ethically and responsibly while maximising operational efficiency in intelligence gathering and analysis. 

  • IDENTIFY advanced techniques for evading and neutralising tracking devices.
  • GAIN INSIGHTS into signal manipulation for gaining an upper hand in surveillance.
  • UNDERSTAND advanced techniques for evading and neutralising tracking devices.
  • MASTER signal manipulation for gaining an upper hand in surveillance.
  • EXPLORE techniques to manipulate device identifiers and evade digital footprints.
  • DISCOVER concealed communication and device concealment for operational security.
  • ANALYSE online activity tracking and utilize open-source intelligence for analysis.
  • LEARN strategies for covert technology deployment and monitoring online forums for insights.
Who should attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples will be added to this course.

 

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Dark Web Investigation Masterclass

Overview

Highlights:

  • 2 day in-person masterclass in Singapore
  • Certificate of Completion on request

What you will learn from this Masterclass:

The course is designed to take participants through the full spectrum of topics necessary to be an effective Cyber Internet investigator. If you are following the trail of cryptocurrency transactions,  tracking paedophiles by using keywords or images, or looking for historic data of your target on the Darknet or the open web, this is the course for you.

  • EQUIP yourself with latest cutting-edge tools and proactive investigation methodology.
  • ACCOMPLISH effective investigation of OSINT and Darknet investigations.
  • STRENGTHEN investigation skills to meet new challenges.
  • GET to the dark web using Tor and other browsers.
  • LOCATE common hubs and resources on the dark web and explore what they have to offer.
  • MANAGE leads from the dark web to the surface in an investigation.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer

Our trainer has over 38 years of experience. A former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police, he is a globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.

He has also has been involved in the tracking of high profile cases, murder and major crime data analysis, and persons and vessel track and trace. He is also an open source expert (SME) and lead advisor for forces and government agencies both domestic and abroad.

Case Studies

Relevant and real world applications and examples will be added as examples in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Counter Improvised Explosive Devices (C-IED): Advanced Strategies for Modern Threats

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

Attendees will gain insights into the global development and technological advancements of IEDs, learn to identify and detect various types of IEDs, and understand potential indicators and placement. This course covers terrorist tactics, techniques, and procedures, with a special emphasis on the detection, neutralisation, and mitigation strategies.  

  • IDENTIFY the components and types of IEDs and learn how to recognise them. 
  • RECOGNISE potential IED indicators and placement, including potential targets. 
  • SPOT home-made explosives effectively. 
  • LEARN about terrorist tactics, techniques, and procedures including planning, site visits, target knowledge, and dry runs. 
  • DETECT, neutralise, and mitigate IEDs by understanding detection methods, defeat mechanisms, general awareness of signs, indicators, and best practices. 
  • EXPLORE the technologies involved in C-IED, including equipment and training. 
  • COMPREHEND roles and responsibilities related to IED threat management, including the importance of information management and information exchange. 
  • ANALYSE IED systems for better understanding and response. 
  • IMPLEMENT effective IED countermeasures, including search, electronic, information, technology, and training methods. 
  • RESPOND to IED attacks with immediate, during-incident, and post-incident actions and planning. 
Who should attend

This course is ideal for the following personnel:

  • Explosive Ordnance Disposal (EOD) Technician 
  • Bomb Squad Member 
  • Counter-Terrorism Officer 
  • Security Manager 
  • Intelligence Analyst 
  • Emergency Response Coordinator 
  • Homeland Security Specialist 
  • Airport Security Manager 
  • Transportation Security Officer 
  • Facility Security Director 
  • National Security Advisor 
  • Technical Specialist in C-IED Technologies 
  • Defence Training Coordinator 
  • First Responder Team Leader 
  • Public Safety Officer 
Trainer

About Our Expert Trainer

Our trainer brings unparalleled experience to Emergency Management, Security, and Counter-Terrorism as a seasoned principal. With an extensive operational and tactical background in high-level security operations and counterterrorism training across the region and the Middle East, Jeff is a trusted authority in the field. 

His distinguished career includes service in the Australian Defence Force (ADF) and the Australian Federal Police (AFP). Notably, he was a Counter-Terrorist First Response Officer and shift supervisor at Sydney Airport during the 2000 Olympics. Trained in demolitions and explosives with the Navy, he further served in the Bomb Response Unit for the AFP at Sydney Airport. 

Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Active Armed Assailant Preparedness and Response Masterclass

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

Participants in this masterclass will learn about behavioural indicators, pre-attack signs, and reporting methods when handling dangerous situations with armed assailants. 

The course will also cover emergency response protocols, key considerations when developing effective Emergency Action Plans (EAPs) and communication strategies to deal with the aftermath of shooting incidents.

  • IMPLEMENT cutting-edge tactics for responding to active shooter and edge weapon scenarios 
  • IDENTIFY in-depth behavioural and pre-attack indicators of potential threats 
  • DEVELOP and implement comprehensive Emergency Action Plans (EAP) 
  • ENHANCE advanced communication strategies during high-stress incidents 
  • ADOPT proactive strategies for ongoing preparedness and regular advanced drills 
  • EXECUTE realistic simulation drills and practice evacuation procedures 
  • BUILD resilient psychological techniques for handling high-stress situations
Who should attend

This training is ideal for a range of job titles within the defence and security sectors, including: 

  • Security Managers and Directors 
  • Law Enforcement Officers and Command Staff 
  • Emergency Response Teams and First Responders 
  • Security Consultants and Risk Management Professionals 
  • Military Personnel and Tactical Units 
  • Facility Managers and Safety Officers 
  • Government Security Officials and Intelligence Analysts 
  • Corporate Security Leaders and Security Personnel 
  • Crisis Management Teams and Incident Response Specialists 
  • Healthcare Security Professionals and Hospital Emergency Teams 
Trainer

About Our Expert Trainer

Our trainer has more than 30 years of experience in Emergency Management, Security Counterterrorism with extensive operational and tactical background in high-level security operations, both regionally and internationally. He has also served as the Counter-Terrorist First Response Officer (and shift supervisor) at Sydney Airport from the 2000 Olympics.

Our trainer has conducted operational security and consulting contracts in conflict zones in the Middle East. He is also a veteran of both the Australian Defence Force (ADF) and the Australian Federal Police (AFP) 

Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Industry Insights
Brochure Download


Mastering Video Surveillance Systems: Design, Implementation and Optimisation

CCTV
Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

Gain invaluable insights into the latest advancements in VSS technology, including camera types, video analytics, and situational awareness in this masterclass.  Apply what you learned from real-world scenarios and VSS techniques to detect and prevent intrusions, monitor critical areas, and responding effectively to incidents. 

Equip yourself with the knowledge and skills to design and implement cutting-edge VSS solutions that address the evolving security landscape.

  • UNDERSTAND the intention and elements of Video Surveillance Systems (VSS), including situational awareness, intrusion detection, life-safety elements, and the impact of artificial intelligence.
  • MASTER VSS and security network design considerations, such as bandwidth, cabling options, power requirements, equipment location, data storage, and information security.
  • EXPLORE coverage zone planning to meet operational requirements.
  • DETERMINE system requirements based on operational needs, including resolution, lighting, and analytics requirements.
  • IDENTIFY layout and location planning considerations, including environmental factors and accessibility.
  • DESIGN monitoring and control locations, considering incident response and ergonomic factors.
  • LEARN about post-incident analysis using recorded footage features.
  • GAIN INSIGHTS into stakeholder requirements and operational considerations that inform system specifications.
Who should attend

The workshop is aimed at security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users. 

  • Architects 
  • Business continuity managers 
  • Crisis response managers 
  • Facilities management managers 
  • Government ministries 
  • Installation engineers 
  • Maintenance engineers 
  • Managers 
  • Operators 
  • Security practitioners 
  • State security agencies 
  • Strategic planner & managers 
  • Strategic risk managers 
  • Supervisors 
  • Policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users. 
Trainer

About Our Expert Trainer

Our trainer is an independent CCTV Consultant at Lambert & Associates. He has more than 35 years’ experience in commercial, military & security systems design. He has been the Director of the Association of Security Consultants for 12 years and served as the Technical Lead on the CCTV National Standards Forum and sits on the British Standards Institution CCTV committee. Our trainer has also developed 3D graphics techniques and software for the CCTV industry. 

Case Studies

Our trainer will include relevant case studies as part of the masterclass.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore.

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Industry Insights
Brochure Download


Offensive Cyber Security for Critical Infrastructure Masterclass

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

Day 1 will cover an overview of offensive information security and cyber security and teach delegates to think like an attacker. This session includes 'live"demonstrations of end-to-end attacks and real-world case studies.

Day 2 will focus on defending against the cyber security threats and risks, and will include technical, procedural and personnel-based defensive controls. It will also look at the security frameworks and security auditing best practices.

  • APPLY knowledge of offensive and defensive cyber security.
  • EQUIP necessary strategies and operational tactics to mitigate the risks and build a structured defence against cyber security threats.
  • IDENTIFY the technical, procedural and human requirements for defensive activities.
  • MEASURE the effectiveness of security controls using security audits and monitoring.
  • NAVIGATE the cyber security threat landscape.
  • OUTLINE the people, processes and technology used to defend an organisation from cyber security attacks.
  •  
Who should attend
  • Director, Head of Department, Managers, Supervisors, Executives and Officers of:

    • Counter-Intelligence Investigation
    • Human Resources
    • Information Security
    • Information Technology (IT)
    • Insider Threat Analysts
    • Insider Threat Program Managers
    • Legal
    • Network Administration
    • Physical Security
    • Software Engineering
Trainer

About Our Expert Trainer

Our trainer is a Certified Information Systems Security Professional working in cyber security for both defence and private industry. He holds a GCHQ accredited first class Master’s degree in Cyber Security and Management, specialising in network architectures and vulnerability management.  He worked for the UK MOD, researching cyber threats to critical national infrastructure and technologies.

Expert Trainer provides cyber security support to both private sector organisations and Defence, including information governance, risk management, human threats and threat intelligence. Expert Trainer is able to consider and synthesise large amounts of information rapidly, making him ideal for roles where both hard cyber skills and architectural rigor are required.

Expert Trainer has many years’ experience in the design, development and implementation of secure networks, network architectures and secure systems. Expert Trainer is also experienced in cyber security analytics, including SIEM and log analysis. He has also conducted a number of security audits, social engineering & OSINT campaigns, awareness training and penetration tests for a variety of organisations across Europe and Asia.

Case Studies

 A number of controlled cyber-attacks will be shown to the students and they will be walked through exactly how they work and how an attacker uses the technology to conduct the attacks. These include live demonstrations of common attacks such as phishing emails, mobile phones attacks, USB attacks, ransomware, wireless Internet attacks, and password attacks.

The attack chain. 

Case studies/examples of different types of attacks. A walk through of some of the high profile cyber-attacks that have occurred in the past few years, explaining how they were potentially carried out and how the attackers exploited weaknesses to conduct the attacks. 

Defensive case studies/examples.  

A variety of real-world cyber-defence controls and protections that can be put into place to mitigate against cyber-attacks.  

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Industry Insights
Brochure Download


CCTV/ Video Surveillance for Security & Risk Mitigation (Malaysia)

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

  • DETECT suspicious indicators relating to their operational environment using CCTV.
  • ASSESS suspicious indicators based on known and predicted criminal and/or terrorist methods of operation.
  • CONDUCT, deploy, interact and communicate using criminal threat mitigation techniques.
  • AUGMENT the human element of security framework and enhance the safety and security of the people and the assets they serve.
  • INCREASE the perceived risk of being detected, captured and possibly arrested,
  • IMPLEMENT effective CCTV Deterrence strategies.
  • MASTER the principles of Security Surveillance through proper CCTV placement.
Who should attend

This Masterclass is ideal for the:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

About  Our Expert Trainer

  • He has over 40 years of experience handling high-profile cases and investigations with the Singapore Police Force.
  • Director (Special Projects) Office of Vice President of Infrastructure
  • Director, Office of Campus Security Commanding Officer, K9-Unit, Special Operations Command, Singapore Police Force
  • Recipient of awards and accolades for outstanding achievements and long service in the police force.
Case Studies

Case examples of real, local cases solved by CCTV and detective ground work will be featured in this  masterclass.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Covert Surveillance and Intelligence Techniques in the Digital Era

Overview

Highlights:

  • 2 day in-person masterclass in Singapore.
  • Certificate of Completion upon request

What you will learn from this Masterclass:

In today's digital era, it is crucial for intelligence professionals to stay abreast of advanced covert surveillance techniques. The global connectivity of the digital age also underscores the need for comprehensive surveillance strategies that can operate seamlessly across diverse digital landscapes. By emphasising operational security, data privacy, and ethical considerations, the workshop ensures that participants are equipped to conduct surveillance activities ethically and responsibly while maximising operational efficiency in intelligence gathering and analysis. 

  • IDENTIFY advanced techniques for evading and neutralising tracking devices.
  • GAIN INSIGHTS into signal manipulation for gaining an upper hand in surveillance.
  • UNDERSTAND advanced techniques for evading and neutralising tracking devices.
  • MASTER signal manipulation for gaining an upper hand in surveillance.
  • EXPLORE techniques to manipulate device identifiers and evade digital footprints.
  • DISCOVER concealed communication and device concealment for operational security.
  • ANALYSE online activity tracking and utilize open-source intelligence for analysis.
  • LEARN strategies for covert technology deployment and monitoring online forums for insights.
Who should attend

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About Our Expert Trainer

  • He has over 38 years of experience.
  • A former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Relevant case studies will be included in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Orchard Hotel Singapore. 

More information will be shared with the participants closer to the date of the masterclass. For assistance, please write to hello@q8asia.com.sg

Brochure Download


Introduction to Cyber Warfare and Operations Design

Overview

This online course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn from this Masterclass:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download