Open Source Intelligence and Social Media Intelligence

Overview

Highlights:

This course is designed to enhance participants’ skills in online investigative techniques and methodologies. It aims to provide an in-depth understanding of advanced methodologies, emerging trends, and cutting-edge technologies in intelligence analysis and cybersecurity.

  • Learn how breach data provides unique opportunities for intelligence analysts to uncover hidden connections, track threat actors, and enhance attribution.
  • Gain insights into deciphering online content and images, as well as to counter misinformation or extremist narratives
  • Understand how threats manifest online and the role of OSINT in monitoring and countering such threats.
Who should attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer is an Open Source Investigator & Consultant, Founder of Glowstick Intelligence Enablement. He has over 7 years of Open-Source Intelligence Analysis and Investigations Experience, with an emphasis on Disinformation Campaigns, Extremism and Cyber Threat Intelligence. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep web sources.

  • Former technical information operations analyst for ActiveFence. Has researched dozens of disinformation campaigns and information operations for a variety of clients globally, including Forbes 50 technology firms.
  • Former open-source intelligence analyst and liaison NCO, Israel Defense Forces
  • Extensive track record in innovative research and investigation projects, including numerous articles in academic journals and think tanks, quotes in media outlets and more.
  • Open-Source Investigation Consultant, Trainer and Analyst. Consultant and Researcher for firms across the globe.
Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and
relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information closer to the date of the course.

Contact us if you need our assistance: hello@q8asia.com.sg.

Brochure Download


Chemical, Biological, Radiological and Nuclear [CBRN] Crisis Response

Overview

Highlights:

  • Intensive 12-Hour Course
  • Certificate of Completion

What you will learn from this Masterclass:

  • UNDERSTAND the CBRN threat, its effect and impact, and the consequence of a poor response to the threat. 
  • UTILISE lateral thinking to understand the threat from the instigator’s perspective, how it may occur, and the intent behind the actions, so that risk mitigation and the subsequent response is effectively enabled.  
  • APPLY effective risk management to the identified threat, and to the initial and subsequent response and recovery. 
  • IDENTIFY weaknesses in counter-CBRN response by understanding the effectiveness of capabilities to then identify gaps in key development programmes. 
  • MEASURE your current response against international standards and against emerging thinking on the ability to mitigate and respond to CBRN threats and hazards. 
  • ASSESS your, and your organisation’s, perception of the CBRN threat, and apply learning to enhance your preparedness to address CBRN threats and hazards. 
  • COMMENCE production, or revision, of your organisational counter-CBRN risk-based response plans. 
Who should attend
  • Strategic Directors and Leaders with responsibility for effective outcomes 
  • Tactical planners with responsibility for effective response plans 
  • Command, Control and Coordination role holders 
  • Risk managers 
  • LE Investigators 
  • Military Intelligence Specialists 
  • LE and Intelligence Analysts; 
  • National Security Analysts 
  • Policy Managers 
  • Diplomats 
  • Liaison Officers 
  • Crisis Communications and PR Departments 
  • CBRN responders 
Trainer

In his current role, our Expert Trainer is at the forefront of international efforts to combat chemical, biological, radiological, and nuclear (CBRN) threats. He is engaged with the Organisation for the Prohibition of Chemical Weapons (OPCW), collaborating with national and international governments across regions as diverse as ASEAN, the Balkans, Africa, and the Caribbean. His work involves developing and planning CBRN counter-terrorism capabilities, contributing to global security. 

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and
relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Participants will receive more information about the venue closer to the date of the course.

For more information, write to hello@q8asia.com.sg

Brochure Download


Offensive Cyber Tactics Masterclass: Mastering Penetration Testing

Overview

This 3-day course is specifically designed to allow participants to delve into the intricate world of cybersecurity, exploring essential skills and methodologies to attack networks and web applications.  The workshop includes hands on exercises to give attendees the opportunity to apply these new skills. 

  • NAVIGATE complex attack surfaces, authentication vulnerabilities, and understand data compromise techniques 
  • ADDRESS contemporary security challenges, including insider threats and wireless network vulnerabilities 
  • DELVE into the intricacies of attacking networks and web applications, gaining hands-on experience in information gathering, vulnerability analysis, and exploitation techniques 
  • GAIN valuable insights into threat intelligence and how to identify and bypass defences 
  • COMBAT evolving cybersecurity issues, from network exploitation to web application vulnerabilities. 
  • TACKLE real-world challenges and contribute effectively to ethical hacking practices 

 

Who should attend
  • Cyber Security Consultant 
  • Penetration Tester 
  • Head Of Cyber 
  • Head Of Security
  • Red Teamer 
  • Ethical Hacker 
  • Security Analyst 
  • Information Security Officer 
  • Technical Assurance 
  • System Administrator 
  • IT Auditor 
Trainer

Our Expert Trainer is a seasoned cybersecurity professional with over a decade of experience specializing in penetration testing and technical assurance. Throughout his career, our Trainer has collaborated with diverse public and private sector entities, providing invaluable security assessments and strategic advice.

He has supported companies across diverse sectors, including energy, health, finance, government, information security, defense, and private industries. His expertise enhances cybersecurity and equips individuals with the skills to deliver security benefits tailored to their respective industries. 

 

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More information of the venue will be shared with the delegates closer to the date of the Masterclass.

Industry Insights

Watch this space for more information.

Brochure Download


Human Intelligence Tradecraft & Covert Human Intelligence Source

Overview

Highlights:

  • Intensive 12-Hour Course
  • Certificate of Completion

What you will learn from this Masterclass:

  • MASTER the HUMINT spectrum, covering various sources of information and engagement strategies. 
  • LEARN when and how to use different types of engagement, from introductions to complex debriefs, for maximum effectiveness. 
  • DEVELOP the skills to identify and assess Subjects of Interest (SOIs) within target networks. 
  • ANALYSE the investigation need, tasking requests, and intelligence gaps to create a focused collection strategy. 
  • ACQUIRE tactics for building rapport and eliciting information effectively, while remaining sensitive to emotional states. 
  • UNDERSTAND holistic approaches to information elicitation, including active listening and information gap identification. 
  • LEARN how to create intelligence reports that maintain source protection and accurately differentiate between facts, suppositions, and source comments. 
Who should attend
  • Military Intelligence Officers 
  • Special Operations Forces (SOF) Personnel 
  • Intelligence Analysts 
  • Counterintelligence Agents 
  • Police Detectives 
  • Security Directors 
  • Risk Assessment Specialists 
  • Security Consultants 
  • National Security Analysts 
  • Corporate Security Managers 
  • Homeland Security Officials 
  • Diplomatic Security Officers 
  • Private Investigators 
  • Crisis Response Coordinators 
  • Security Operations Managers 
  • Border Patrol Agents 
  • Emergency Response Team Leaders 
  • Threat Assessment Analysts 
  • Counterterrorism Analysts 
  • Surveillance Specialists 
Trainer

Our Expert Trainer has completed 23 years in the British Army Intelligence Corps working in various fields including Counter Intelligence, Technical Investigations, Information Assurance, HUMINT IMINT and Cyber Security.

He developed an OSINT course to train other investigators and intelligence analysts in researching using the internet and doing it safely and anonymously.  He has worked in mainland Europe, the Middle East and West Africa and currently teaches OSINT techniques to military staff across the 27 NATO nations and defence industry partners.

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and
relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This masterclass will be held at Orchard Hotel Singapore. 

For more information, write to hello@q8asia.com.sg

Brochure Download


Offensive Cyber Security for Critical Infrastructure Masterclass

Overview

Day 1 will cover an overview of offensive information security and cyber security and teach delegates to think like an attacker. There will be live demonstrations of end-to-end attacks and real-world case studies.

Day 2 will focus on defending against the cyber security threats and risks, and will include technical, procedural and personnel-based defensive controls. It will also look at the security frameworks and security auditing best practices.

What you will learn from this Masterclass:

  • APPLY knowledge of offensive and defensive cyber security.
  • EQUIP necessary strategies and operational tactics to mitigate the risks and build a structured defence against cyber security threats.
  • IDENTIFY the technical, procedural and human requirements for defensive activities.
  • MEASURE the effectiveness of security controls using security audits and monitoring.
  • NAVIGATE the cyber security threat landscape.
  • OUTLINE the people, processes and technology used to defend an organisation from cyber security attacks.
  •  
Who will attend
  • Director, Head of Department, Managers, Supervisors, Executives and Officers of:

    • Counter-Intelligence Investigation
    • Human Resources
    • Information Security
    • Information Technology (IT)
    • Insider Threat Analysts
    • Insider Threat Program Managers
    • Legal
    • Network Administration
    • Physical Security
    • Software Engineering
Trainer

Expert Trainer is a Certified Information Systems Security Professional working in cyber security for both defence and private industry. He holds a GCHQ accredited first class Master’s degree in Cyber Security and Management, specialising in network architectures and vulnerability management.  He worked for the UK MOD, researching cyber threats to critical national infrastructure and technologies.

Expert Trainer provides cyber security support to both private sector organisations and Defence, including information governance, risk management, human threats and threat intelligence. Expert Trainer is able to consider and synthesise large amounts of information rapidly, making him ideal for roles where both hard cyber skills and architectural rigor are required.

Expert Trainer has many years’ experience in the design, development and implementation of secure networks, network architectures and secure systems. Expert Trainer is also experienced in cyber security analytics, including SIEM and log analysis. He has also conducted a number of security audits, social engineering & OSINT campaigns, awareness training and penetration tests for a variety of organisations across Europe and Asia.

Case Studies

Live end-to-end attack demonstrations. 

 A number of controlled cyber-attacks will be shown to the students and they will be walked through exactly how they work and how an attacker uses the technology to conduct the attacks. These include live demonstrations of common attacks such as phishing emails, mobile phones attacks, USB attacks, ransomware, wireless Internet attacks, and password attacks.

The attack chain. 

Case studies/examples of different types of attacks. Please elaborate more. A walk through of some of the high profile cyber-attacks that have occurred in the past few years, explaining how they were potentially carried out and how the attackers exploited weaknesses to conduct the attacks. 

Defensive case studies/examples.  

A variety of real-world cyber-defence controls and protections that can be put into place to mitigate against cyber-attacks. A number of specific examples from the instructor’s personal and professional experience will be given, including taking a layered approach to security, and protecting against human threats.  

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

For more information, please write to hello@q8asia.com.sg

Industry Insights
Brochure Download


Introduction to Cyber Warfare and Operations Design (ICWOD)

Overview

This online course provides a basic understanding of full-spectrum cyberspace operations, the complexities of the cyberspace environment, the planning, organizing and integration with cyber ops. Included in this course are presentations and exercises that teach participants how to design a cyberspace operations plan and bring it to fruition.

What you will learn from this Masterclass:

  • Understanding the Cyberspace Environment and Design
  • Cyberspace Strategies
  • Cyberspace Operations Integration
  • Building Cyber Warriors and Cyber Corps
  • Designing Cyber-Related Commands
  • Training and Readiness for Cyber Operations
  • Rehearsal of Concept (ROC) Drill
  • Tabletop Exercise (TTX)
Who should attend

Anyone interested in the field of cyber warfare/cyber operations or looking to expand a cyber-security career. This course is also ideal for:

  • Military Commanders
  • Information-Operations Officers
  • Information Security/Assurance Professionals
  • Cyber-Security Consultants
  • Cyber Planners
  • Military Members (J2, J3, J5, J6, J9)
  • Security Analysts
  • Network-Security Engineers Penetration Testers
  • Auditors
  • Government Officials
  • Security Engineer
Trainer

Our Expert Trainer is a cybersecurity professional with over 12 years of experience in Information Assurance, Cyber Frameworks, Policies and several critical areas across numerous industries spanning several Fortune 500 companies and consulting positions. He is also a Senior Strategic Business Advisor and vCISO at Sentinel Technologies.

Outside his professional civilian career, our trainer proudly serves as a direct commission officer in the US Navy Reserves as a Cryptologic Warfare officer (Designator 1815). He is also a research fellow with the Cybersecurity Forum Initiative, where he has co-authored several research papers on new cyber trends and best practices. He also holds several leadership positions with InfraGard Chicago and InfraGard National, serves as an advisor to several private and public entities, and is a guest lecturer at several high schools and universities across the State of Illinois.

Case Studies

Participants will be guided through a series of cascading exercises for conceptual, functional, and detailed planning of cyberspace operations.

Partners

This course is presented in association with The Cyber Security Forum Intiative.

The Cyber Security Forum Initiative (CSFI) is a non-profit organization headquartered in Omaha, NE and in Washington DC with a mission "to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training to assist the US Government, US Military, Commercial Interests, and International Partners."

The Cyber Warfare and Operations Design course in endorsed by Capitol Technology University (CTU), a designated National Security Agency (NSA) Center of Excellence.

Q8 welcomes partners who are interested to join us and be part of this training.

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about how to join the course when they sign up with us.

Brochure Download


[Expert-Led Digital Masterclass] Protect by Breaching (red teaming in action)

Overview

In this course, you will:

  • Discover the methods used by cyber attackers to breach systems and networks.
  • Learn to recognize vulnerabilities and thwart potential threats.
  • Equip yourself with essential cybersecurity skills and knowledge.
  • Uncover the truth behind the staggering statistics.
  • Apply (ethical) hacking techniques to uncover technical and human-related vulnerabilities that may go unnoticed during a regular security assessment.
  • Experience first-hand how actual cyberattacks occur and understand vulnerabilities from an attacker's perspective through real world simulations.
Who should attend

The workshop is ideal for:

  • Law enforcement and Military personnel
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Risk and Crisis managers
Trainer

Trainer 1 has more than  20 years of experience in the field of information and cyber security. He comes from a technical background studying electrical engineering at Delft University in the Netherlands, and applied those technical skills to help organisations connect safely to the Internet since the early ’90’s.  He uses an open and risk-based approach to the cyber and information security questions. This approach provides the best solution for any particular situation and creates best value. His solutions are based on his belief that information and cyber security should facilitate and not frustrate an organisation.

Trainer 2 is a cyber security specialist with more than 20 years of experience as a consultant and system administrator. In recent years, he has chosen to specialised in security and IT Security training. He is also an author and Co-author of several vulnerable labs at: Hack The Box, Try Hack Me, Offensive Security - Proving Grounds, Vulnhub. 

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More information will be sent to the participants closer to the date of the course.

Industry Insights

Watch this space for more information.

Brochure Download


[Expert-Led Masterclass] Intelligence Gathering & Report Creation for Investigations

Overview

Protecting the integrity of a real-world exhibit is easy and straightforward. Applying the same level of procedure to a non-tangible item, such as a screenshot, is much harder. This course will allow you to achieve this level of protection against scrutiny, which is essential if the report will be used to support action against a member of staff, evidence against a threat actor or subject, or support of a case, arrest, or warrant in court.  

This masterclass includes hands-on interactive activities. Participants are encouraged to bring along their laptop to participate in the activities.

What you will learn from this Masterclass:

  • AWARENESS around investigative reports to a high standard that will stand rigorous scrutiny by another party or court. 
  • MASTER the latest and updated methods and tradecraft to protect digital intelligence gathered and ‘seal’ it in a virtual evidence bag, to prove integrity and honesty on the part of the investigator.  
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring. 
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations and avoid pitfalls and scrutiny. 
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations by converting non tangible data and intelligence into evidential matter. 
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence. 
Who should attend

Military, government and police investigators with the following job titles: 

  • Counterintelligence Investigators 
  • Cybercrime Intelligence Officers 
  • Digital Media Examination and Device Investigators 
  • Intelligence Analysts 
  • Intelligence Collection Managers 
  • Law Enforcement Investigators 
  • Military Intelligence Officer 

Private sector: 

  • Investigative journalists 
  • Private investigators 
  • Counter corruption investigators 
  • Corporate intelligence analysts, for due diligence and organisational security 
  • Security Researchers 
Trainer

Our Expert Trainer is a pioneer in Open-Source Intelligence Analysis and Investigations and App Developer. Skilled and experienced in a number of domains, including technical domain analysis, multilingual open-source investigations, open-source product development and deep websources.

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More details will be sent to the participants closer to the date of this course.

For more information, please contact: hello@q8asia.com.sg.

Brochure Download


[Expert-Led Masterclass] Security Design for Critical Infrastructures & Public Spaces

Overview

This two-day in-depth and hands-on workshop designed to equip you with the essential expertise, knowledge, and strategies for designing foolproof security systems. 

Tailored for those involved in the construction of critical infrastructures and public spaces, you will gain timely insights and practical strategies to effectively safeguard these vital assets.

  • DETERMINE the evidence required to demonstrate security.
  • UNDERSTAND of the Security Management approach to safeguard assets and business processes.
  • INSIGHTS into different modes of operation and their impact on security.
  • IDENTIFY of how facility surroundings can affect security.
  • DEFINE user groups and their security needs.
  • KNOWLEDGE of facility security constraints and objectives.
  • APPLY Operational Requirements (ORs) to inform security system requirements.
  • GAIN AWARENESS of the security risks associated with critical infrastructures and public spaces.
Who will attend

The workshop is ideal for security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users, including:

  • Business continuity, crisis response and strategic risk managers
  • Facilities management managers
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Strategic planners & managers

Professionals from the following sectors:

  • Airport, ports, rail
  • Diplomatic service
  • Education institutions & schools
  • Financial institutions & data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & border control
  • Oil & gas infrastructure
  • Power plant and public utilities
  • Retail, sports and hospitality sectors
Trainer

Expert Trainer has 24 years of experience in security related field. A Chartered Security Professional, he is a member of Lead writing team for ASIS International Physical Assets Protection Standard. He has designed security for the London 2012 Olympic Games Main Stadium, which was the
first stadium to achieve a Secured by Design award.

 

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


[Expert-Led Masterclass] C-IEDs in Today’s Terror Threat Environment

Overview

This Digital-led Expert Masterclass is designed to equip delegates to gain a strategic understanding on IED’s, IED attacks and how to firstly prevent and minimise risk of attack and secondly to help deal with an attack should the worse happen. The workshop will also explore methods of information gathering and the importance of information sharing and reporting when attacks occur.

What you will learn from this Masterclass:

  • IDENTIFY technologies involved in C-IED and methods of employment.
  • UNDERSTAND the key C-IED activities of, predict, pursue, prevent, detect, neutralise, mitigate, and exploit.
  • DIFFERENTIATE and UNDERSTAND roles and responsibilities of staff, managers and law enforcement or authorities.
  • RECOGNISE the importance of Information Management/Exchange in its effectiveness at all levels.
  • CREATE general awareness of signs and indicators and best practice.
  • MASTER the tactics, techniques and procedures used to counter the threat they present.
Who will attend
  • Chief Operations Officers (COO)
  • Chief Security Officers (CSO)
  • Chief Strategy Officers
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Directors and/or Managers
  • Risk Managers and/or Directors
  • Security Director and/or Manager
  • Security Supervisor Vice President and/or Director of Security
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents. Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
Trainer

Our Expert Trainer has 30 years’ experience in both military and civilian, in the safe handling, storage, movement use, and disposal of explosives and associated hazardous substances. He has extensive experience of IEDD, Explosive Ordnance Disposal (EOD) and Conventional Munitions Disposal (CMD) operations.

He is an accomplished Training leader and has trained or over seen the training of over 2000 students in Afghanistan, Libya, Kenya, Ethiopia, Iceland, USA, Poland, Sweden, and Germany.

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More details of the venue will be sent to the participants closer to the date of the event.

For more information, contact: 
hello@q8asia.com.sg.

Brochure Download