[Expert-Led Masterclass] Tactical Data Links (TDLs)

Overview

TDL’s are key to providing integrated information networks and applications, facilitating shared Situational Awareness and enabling the exploitation of information across the battlespace. The understanding of what TDL’s can and cannot do is important for everything that is done in the TDL and Multi Domain C2 worlds. More importantly to you, it is the cornerstone of everything that will be taught on this course.

This training provides personnel with the knowledge required to understand and interact with the complexities that are TDL’s.  Attendees will come out of the course with a greater confidence in their abilities to engage in TDL conversations.

  • EXPLAIN the history of TDLs
  • Understand the characteristics of in service of TDLs (Links 11, 16, 22, VMF and JREAP)
  • EQUIP yourself with TDLs terminals and equipment
  • MASTER the operational applications of TDLs
  • STRENGTHEN skills in standards and interoperability including interoperability challenges
Who should attend

This course is ideal for

  • Engineers
  • Operators
  • Procurement Staff
  • Policy Advisors
  • Academics & Researchers
  • Industry Programme Managers
  • Developers and Engineers
Trainer

About Our Trainer: 

  • Over 30 years of field experience
  • Deployed worldwide in support of Operations and Exercises, achieving 3,500 flying hours in numerous Radar, Electronic Warfare and Tactical Datalinks (TDL) related roles.
  • Qualified Intelligence, Surveillance, Target Acquisition and Reconnaissance Instructor specialising in Air Command and Control, Electronic Surveillance and Electronic Warfare, and TDL.
  • Link 16 Advisor and in the UK working within Interoperability and Training
Case Studies

The trainer will share relevant case studies where applicable.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be held at Hard Rock Hotel Singapore. More details will be sent to the participants closer to the date of the event.

For enquiries, please contact us at hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Anti-Drone Countermeasures for Critical Infrastructures

Overview

Highlights:

  • Intensive 4-Hour Course 
  • Remote Access
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn at this Expert-Led Digital Masterclass:

  • MITIGATE against the threat of unmanned aerial systems – as drones are typically known in military contexts.
  • ASSESS the risk and vulnerabilities of drone terrorism.
  • CONSIDER all possible, innovative ways terrorists might use UAS
  • ENGAGE in a comprehensive vulnerability assessment to identify security and protection gaps.
Who should attend
  • Counterterrorism Officers
  • Law Enforcement and Intelligence Officers
  • Risk / Crisis Response Managers
  • Chief /Director/ Manager of Security
  • Chief Operations Officer
  • VP of Security
Trainer

Our Expert Trainer has been working, training and educating internationally in the field of anti and counter-terrorism for the past 25 years. He is a retired former
member of a counterterrorism training wing, known only as DG1.

He has been delivering education and training to International Police, Armed Forces, and Private Security Personnel including international organizations from both public and private sectors. His work has taken him through Russia, Ukraine, Kazakhstan, Latvia, Estonia, Finland, United States, Ecuador, Egypt, Poland, Bulgaria, Turkey, Greece, Italy and many more places in connection with his duties. He gives his clients a leading edge in preventing and countering the phenomenon that is International Terrorism to make the world a safer place.

Case Studies

Featured Case Study 1: Successful Case Study on Counter Drone Solutions on Public Venue and Critical Infrastructure

Case Study 2:  Country Action Plans and Policies on Countering Misuse of Drones

Assessing How Terrorists Are Exploiting Critical Infrastructure Vulnerabilities

Partners

FEATURE PARTNER:

Regulus Cyber was founded in 2016 with the vision of providing cybersecurity for GNSS, authenticating satellite-based navigation and timing to assure accuracy, reliability and security. Co-founders Yonatan Zur, CEO, and Yoav Zangvil, CTO, are industry veterans with diverse experience across industries including Aerospace, defense, communications and navigation systems. The company is backed by leading Venture Capital firms including Sierra Ventures, Canaan Partners, F2 capital and The Technion, Israel’s leading Technological University. (GNSS = Global Navigation Satellite Systems: GPS-USA, Galileo-Europe, BeiDou-China, GLONASS-Russia).

Website: https://www.regulus.com/

Venue

This Digital Masterclass will be conducted on Zoom.

We will be in touch closer to the date of the course with the information.

Brochure Download


[Expert-Led Digital Masterclass] Open Source and Social Media Intelligence

Overview

Highlights:

  • Intensive 12-Hour Course
  • Remote Access
  • More than 12 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

This masterclass is a full hands-on interactive course where the methodology and best practice is explained, and then the students practice the tradecraft live and online. Please be advised that this course is almost 50% practical workshops and exercises, so your own laptop is essential. The course will be a presentation and demonstration of the techniques. Students are encouraged to follow along during the course on the own laptop.

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to social media intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who will attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Expert Trainer is a globally recognised communications data expert, who works as an adviser, trainer and consultant to security services, government and police forces around the world.

His experience, and USP, is based on 38 years as a detective, which includes experience gained working for the UK National Crime Agency (NCA), Metropolitan police, Child Exploitation and Online Exploitation (CEOP), and UK/US government agencies, in the capacity of overt, reactive and covert operations management.

Case Studies

Cases and examples, both current and historic will be given throughout, to add depth and
relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely. Our onboarding package will ensure a smooth learning experience.
Not to worry, we're ready to answer any questions, reach us at hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Background Vetting and Insider Threat Mitigation

Overview

Highlights:

  • Intensive 12-Hours Course
  • Remote Access
  • More than 6 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What will you learn in this Masterclass?

  • MASTER good tradecraft and digital hygiene when researching an applicant or member of staff.
  • CAPTURE data relating to the subject, deleted, historic and current.
  • EQUIP yourself with the latest and updated methods to effectively profile a subject.
  • ADOPT the latest cutting-edge tradecraft and good practice.
  • STEP UP skills in effectively capturing everything in a subject’s digital footprint.
  • STRENGTHEN investigative skills to meet the new challenges offered by Internet investigations when deployed.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence gathering on subjects.
Who should attend?
  • Vetting Officers and Teams
  • Organisational Security Teams
  • Recruitment Teams
  • Internal Investigation Officers
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About our Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely.

Let us know if you have any questions by sending them to hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Real World Surveillance Techniques

Overview

Highlights:

  • Intensive 12-Hour Course
  • Remote Access
  • More than 12 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What you will learn from this Masterclass:

  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence of individuals through digital shadow.
  • MASTER the latest and updated methods and tradecraft to proactive investigation.
  • ADOPT the latest cutting-edge tools in relation to Crime group intelligence monitoring.
  • STEP UP investigative skills to meet the new challenges offered by Internet investigations the anonymity of the Darknet and encrypted channels and hidden chat rooms.
  • STRENGTHEN investigative skills to meet to combat the ever increasing problem of encryption.
  • DEVELOP high quality reports and evidence relating to online investigations and intelligence.
Who will attend

Military, government and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About the Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples and practical exercises will be conducted throughout this 2-day course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Masterclass will be conducted online. For more information, please email us at hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] CARVER plus Shock Vulnerability Assessment Tool

Overview

Highlights:

  • Intensive 12-Hours Course
  • Remote Access
  • More than 6 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What will you learn in this Masterclass?

  • EQUIP yourself with the Risk-based Decision-Making Model.
  • ANALYSE the effects of consequence, threat, and vulnerability when planning for executing and recovering from a security incident.
  • PLAN, PREPARE, CONDUCT, and REPORT a Vulnerability Assessment.
  • EMPLOY the principles of the CARVER Methodology.
  • IDENTIFY the most effective point/element to attack, and also the weakest point(s) to protect.
Who should attend?
  • Professionals engaged in security planning.
  • Security officers and security experts of critical infrastructure and facilities in government organisations, public and commercial sectors.
  • Intelligence officials in security Governmental and Public organisations as well as the private sectors.
Trainer

About our Expert Trainer

  • Over 30 years of field experience.
  • Author of "CARVER+Shock, Vulnerability Assessments".
  • Retired US Army Special Forces Officer.
  • High experienced in developing and implementing critical infrastructure protection programme and armed response capabilities.
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass will be conducted on Zoom.

Let us know if you have any questions by sending them to hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] GPS Spoofing Techniques and Procedures

Overview

Highlights:

  • Intensive 6-Hours Course
  • Remote Access
  • More than 6 hrs of downloadable instructional material
  • On-demand Expert Knowledge
  • Access on mobile and TV
  • Certificate of Completion

What will you learn in this Masterclass?

  • MASTER the updated methods and tradecraft for proactive
  • ADOPT the latest cutting-edge tools in relation to Wi-Fi spoofing and control signal interception.
  • STEP UP interception, disruption and exploitation skills of Wi-Fi, RFID, and remote device control.
  • STRENGTHEN effective deployment techniques and procedures.
  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online
Who should attend?

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators 
  • Cybercrime Intelligence Officers 
  • Digital Media Examination and Device Investigators 
  • Intelligence Analysts 
  • Intelligence Collection Managers 
  • Law Enforcement Investigators 
  • Military Intelligence Officer 
  • Security Researchers 
Trainer

About our Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely.

Let us know if you have any questions by sending them to hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Intelligence Gathering in Today’s Digital Age

Overview

This course features four of our most popular courses for Intelligence, Security and Defence professionals in one single bundle:

  1. Open Source Intelligence (OSINT) and Social Media Intelligence (SOCMINT)
  2. Human Intelligence (HUMINT) Techniques and Procedures
  3. Digital Surveillance Techniques
  4. Real World Surveillance Techniques

Highlights:

  • 4 modules, each module is taught over two days with more than 12 hours worth of content
  • Remote Access on the go, from your desktop or on your mobile device
  • On-demand Expert Knowledge and access to materials, software after each module
  • Certificate of Completion

What will you learn in this Masterclass?

  • MASTER the latest techniques in digital investigations.
  • ADOPT the latest cutting-edge tools in the  interception, disruption and exploitation skills for intelligence gathering work.
  • STRENGTHEN effective deployment techniques and procedures.
  • TRACK and BUILD UP analysis of digital footprint from their human intelligence and online presence
Who should attend?

Military, government, law enforcement and police investigators with the following job titles:

  • Counterintelligence Investigators
  • Cybercrime Intelligence Officers
  • Digital Media Examination and Device Investigators
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

About our Expert Trainer

  • Over 38 years of experience.
  • Former Child Exploitation and Online Exploitation (CEOP) Data Communications Manager, UK National Crime Agency (NCA), and London Metropolitan Police.
  • Globally recognised communications data expert, works as an adviser, trainer and consultant to security services, government, and police forces around the world.
  • Lecturer for International Policing Organisations, EU cybercrime twinning project, The Council of Europe and The UK College of policing.
Case Studies

Real world applications and examples: Cases and examples, both current and historic will be given throughout, to add depth and relevance to the methodology.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

This Expert-Led Digital Masterclass is conducted remotely.

Let us know if you have any questions by sending them to hello@q8asia.com.sg.

Brochure Download


[Expert-Led Digital Masterclass] Active Shooter/ Assailant(s) Preparedness & Response

Overview

This Masterclass provides delegates a strategic understanding of how to gather information and rapidly deploy necessary actions in response to terrorist attacks in a public area.

Delegates will learn the practical steps to take in the event of a critical incident including dynamic lockdown and how to respond effectively in a critical incident such as active assailant attack.

Delegates will also learn key leadership skills in the event of a crisis including staying prepared, managing the aftermath and continual improvement of the crisis management framework.

In addition, delegates will have the opportunity to explore a new vulnerability assessment tool that has been developed with consideration to the latest emerging trends in Terrorism.

What you will learn from this Masterclass:

  • ASSESS current threat environment and EXAMINE its impacts on an organisation risk profile.
  • HEIGHTEN security of an agency/ organisation in a threat environment.
  • ESTABLISH the practical steps to be adopted in the event of an attack.
  • EMPOWER leadership in a crisis from preparedness to response.
  • DEVELOP a response plan that effectively respond to critical incidents.
  • EDUCATE employees with all the necessary steps to be taken in the event of an emergency response.
Who should attend

Professionals who are responsible for people, property and/or business continuity, in the area of security/ risk management and operational management, as well as:

  • Business Continuity Managers
  • Corporate Security Managers
  • Crisis Response Managers
  • Facilities Management Managers
  • Government Ministries
  • Security Consultants
  • State Security Agencies
  • Strategic Planner & Managers
  • Strategic Risk Managers
Trainer

With 33 year’s experience with the NSW Police Force, our  Trainer has recently been appointed Head of Security, Rugby League World Cup 2017, as well as other notable appointments including Lead Security and Risk Consultant, Vivid Sydney 2016 Event.

He has consulted major organisations in the area of Risk Management, Threat Environment and Counter Terrorism training.

Our Trainer has partnered with Deloitte in the areas of Risk management, Recovery and Resilience and provided counter terrorism response training (Responding to Workplace Emergencies) to Prime Group, Red Dawn, Village Roadshow and ANZAC War Memorial.

The Trainer was the key NSWPF contact for The Department of Premier and Cabinet (Protocol and Special Events Division) and Destination NSW. This included responsibility for activation of the Police Operations Centre/Government Coordination Centre in the event of a major incident or emergency.

The Trainer has represented the NSW Police Force at many international events including the Australian Government Observers program Qatar Asian Cup 2011, observer to NYPD security operations in support of United Nations General events in New York and major event security planning with other Federal Agencies in Washington.

Case Studies

HIGH IMPACT LEARNING - Class Exercise 1

Emergency/ Crisis Management Scenario

HIGH IMPACT LEARNING - Class Exercise 2

Active Shooter Scenario

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

To be confirmed.

 

Industry Insights
Brochure Download


[Expert-Led Digital Masterclass] Reading Suspicious Indicators & The Adversary’s Method of Operations

Overview

This training provides security and law enforcement officers with the tools and skills to effectively assess threats in their operational environments. Attendees will learn more about Suspicious Indicators and Adversary’s Methods of Operations, allowing the organisation to avoid liability issues and increase overall threat mitigation capabilities.

Attendees will also learn how to proactively prevent, deter and respond to criminal and terrorist threats including hostile surveillance, intelligence gathering, dry runs and execution of the crime/attack. The training begins by making the attendees to think like the adversary and then use their experiences to assess threats and develop effective countermeasures. This training has been delivered to thousands of security professionals all over the world.

Key Takeaways from Attending This Workshop:

  • Understand the operational process of executing a successful attack
  • Identify criminal or terrorist Methods of Operations (MOs).
  • Experience adversary’s perspectives through training modules and exercises.
  • Pinpoint what can be considered suspicious in their protected environment.
  • Master bomb configurations as well as concealment methods of means of aggression.
  • Utilise Predictive Profiling methodology in threat assessments of people, objects and situations.
Who will attend
  • Military members tasked with protecting installations (force protection) or responsible for responding to terrorist-related incidents.
  • First response personnel (Police, Fire, Medics) responsible for responding to terrorist incidents.
  • Directors of Security responsible for conducting assessments, developing policies and procedures and training members of their staff to identify and prevent terrorist activity.
  • Members of security departments and units that hold responsibility for access control or are first responders for their organisation.

Professionals such as:

  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security

 

Trainer

Our  Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. The Trainer has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

The Trainer is also a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer. Kim is a member of the Fire Prevention Association of Australia, Institute of Security Providers Association of Australia Ltd and ASIS.

Workshop Trainer is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

The modules in the training offered are supported with group exercises, scenario simulations and video evidence, in addition to reviews of many pertinent case studies. Workshop facilitator will work closely with the participants to address scenarios and incidents that are relevant to their specific skill set.

Case studies include:

  • Anne Marie Murphy
  • Pi Glilot Gas Depot
  • Mohammed Sadique Khan
  • Rainbow Warrior
  • Pan Am Fl 103
  • 9/11
  • Korean Air FL 858
  • Karin A
  • The ‘Little Bomber’

 

Partners

Training Partner:

 

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Details will be sent to attendees closer to the date of the course.

Industry Insights
Brochure Download