Offensive Cyber Security for Critical Infrastructure

Overview

Day 1 will cover an overview of offensive information security and cyber security and teach delegates to think like an attacker. There will be live demonstrations of end-to-end attacks and real-world case studies.

Day 2 will focus on defending against the cyber security threats and risks, and will include technical, procedural and personnel-based defensive controls. It will also look at the security frameworks and security auditing best practices.

What you will learn from this Masterclass:

  • APPLY knowledge of offensive and defensive cyber security.
  • EQUIP necessary strategies and operational tactics to mitigate the risks and build a structured defence against cyber security threats.
  • IDENTIFY the technical, procedural and human requirements for defensive activities.
  • MEASURE the effectiveness of security controls using security audits and monitoring.
  • NAVIGATE the cyber security threat landscape.
  • OUTLINE the people, processes and technology used to defend an organisation from cyber security attacks.
  •  
Who will attend
  • Director, Head of Department, Managers, Supervisors, Executives and Officers of:

    • Counter-Intelligence Investigation
    • Human Resources
    • Information Security
    • Information Technology (IT)
    • Insider Threat Analysts
    • Insider Threat Program Managers
    • Legal
    • Network Administration
    • Physical Security
    • Software Engineering
Trainer

Expert Trainer is a Certified Information Systems Security Professional working in cyber security for both defence and private industry. He holds a GCHQ accredited first class Master’s degree in Cyber Security and Management, specialising in network architectures and vulnerability management.  He worked for the UK MOD, researching cyber threats to critical national infrastructure and technologies.

Expert Trainer provides cyber security support to both private sector organisations and Defence, including information governance, risk management, human threats and threat intelligence. Expert Trainer is able to consider and synthesise large amounts of information rapidly, making him ideal for roles where both hard cyber skills and architectural rigor are required.

Expert Trainer has many years’ experience in the design, development and implementation of secure networks, network architectures and secure systems. Expert Trainer is also experienced in cyber security analytics, including SIEM and log analysis. He has also conducted a number of security audits, social engineering & OSINT campaigns, awareness training and penetration tests for a variety of organisations across Europe and Asia.

Case Studies

Live end-to-end attack demonstrations. 

 A number of controlled cyber-attacks will be shown to the students and they will be walked through exactly how they work and how an attacker uses the technology to conduct the attacks. These include live demonstrations of common attacks such as phishing emails, mobile phones attacks, USB attacks, ransomware, wireless Internet attacks, and password attacks.

The attack chain. 

Case studies/examples of different types of attacks. Please elaborate more. A walk through of some of the high profile cyber-attacks that have occurred in the past few years, explaining how they were potentially carried out and how the attackers exploited weaknesses to conduct the attacks. 

Defensive case studies/examples.  

A variety of real-world cyber-defence controls and protections that can be put into place to mitigate against cyber-attacks. A number of specific examples from the instructor’s personal and professional experience will be given, including taking a layered approach to security, and protecting against human threats.  

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

For more information, please write to hello@q8asia.com.sg

Industry Insights
Brochure Download


Offensive Cyber Security for Critical Infrastructure Masterclass

Overview

Day 1 will cover an overview of offensive information security and cyber security and teach delegates to think like an attacker. There will be live demonstrations of end-to-end attacks and real-world case studies.

Day 2 will focus on defending against the cyber security threats and risks, and will include technical, procedural and personnel-based defensive controls. It will also look at the security frameworks and security auditing best practices.

What you will learn from this Masterclass:

  • APPLY knowledge of offensive and defensive cyber security.
  • EQUIP necessary strategies and operational tactics to mitigate the risks and build a structured defence against cyber security threats.
  • IDENTIFY the technical, procedural and human requirements for defensive activities.
  • MEASURE the effectiveness of security controls using security audits and monitoring.
  • NAVIGATE the cyber security threat landscape.
  • OUTLINE the people, processes and technology used to defend an organisation from cyber security attacks.
  •  
Who will attend
  • Director, Head of Department, Managers, Supervisors, Executives and Officers of:

    • Counter-Intelligence Investigation
    • Human Resources
    • Information Security
    • Information Technology (IT)
    • Insider Threat Analysts
    • Insider Threat Program Managers
    • Legal
    • Network Administration
    • Physical Security
    • Software Engineering
Trainer

Expert Trainer is a Certified Information Systems Security Professional working in cyber security for both defence and private industry. He holds a GCHQ accredited first class Master’s degree in Cyber Security and Management, specialising in network architectures and vulnerability management.  He worked for the UK MOD, researching cyber threats to critical national infrastructure and technologies.

Expert Trainer provides cyber security support to both private sector organisations and Defence, including information governance, risk management, human threats and threat intelligence. Expert Trainer is able to consider and synthesise large amounts of information rapidly, making him ideal for roles where both hard cyber skills and architectural rigor are required.

Expert Trainer has many years’ experience in the design, development and implementation of secure networks, network architectures and secure systems. Expert Trainer is also experienced in cyber security analytics, including SIEM and log analysis. He has also conducted a number of security audits, social engineering & OSINT campaigns, awareness training and penetration tests for a variety of organisations across Europe and Asia.

Case Studies

Live end-to-end attack demonstrations. 

 A number of controlled cyber-attacks will be shown to the students and they will be walked through exactly how they work and how an attacker uses the technology to conduct the attacks. These include live demonstrations of common attacks such as phishing emails, mobile phones attacks, USB attacks, ransomware, wireless Internet attacks, and password attacks.

The attack chain. 

Case studies/examples of different types of attacks. Please elaborate more. A walk through of some of the high profile cyber-attacks that have occurred in the past few years, explaining how they were potentially carried out and how the attackers exploited weaknesses to conduct the attacks. 

Defensive case studies/examples.  

A variety of real-world cyber-defence controls and protections that can be put into place to mitigate against cyber-attacks. A number of specific examples from the instructor’s personal and professional experience will be given, including taking a layered approach to security, and protecting against human threats.  

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

For more information, please write to hello@q8asia.com.sg

Industry Insights
Brochure Download


[Expert-Led Digital Masterclass] Protect by Breaching (red teaming in action)

Overview

In this course, you will:

  • Discover the methods used by cyber attackers to breach systems and networks.
  • Learn to recognize vulnerabilities and thwart potential threats.
  • Equip yourself with essential cybersecurity skills and knowledge.
  • Uncover the truth behind the staggering statistics.
  • Apply (ethical) hacking techniques to uncover technical and human-related vulnerabilities that may go unnoticed during a regular security assessment.
  • Experience first-hand how actual cyberattacks occur and understand vulnerabilities from an attacker's perspective through real world simulations.
Who should attend

The workshop is ideal for:

  • Law enforcement and Military personnel
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Risk and Crisis managers
Trainer

Trainer 1 has more than  20 years of experience in the field of information and cyber security. He comes from a technical background studying electrical engineering at Delft University in the Netherlands, and applied those technical skills to help organisations connect safely to the Internet since the early ’90’s.  He uses an open and risk-based approach to the cyber and information security questions. This approach provides the best solution for any particular situation and creates best value. His solutions are based on his belief that information and cyber security should facilitate and not frustrate an organisation.

Trainer 2 is a cyber security specialist with more than 20 years of experience as a consultant and system administrator. In recent years, he has chosen to specialised in security and IT Security training. He is also an author and Co-author of several vulnerable labs at: Hack The Box, Try Hack Me, Offensive Security - Proving Grounds, Vulnhub. 

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

More information will be sent to the participants closer to the date of the course.

Industry Insights

Watch this space for more information.

Brochure Download


[Expert-Led Masterclass] Mastering Video Surveillance Systems

Overview

Gain invaluable insights into the latest advancements in VSS technology, including camera types, video analytics, and situational awareness in this masterclass.  Apply what you learned from real-world scenarios and VSS techniques to detect and prevent intrusions, monitor critical areas, and responding effectively to incidents. 

Equip yourself with the knowledge and skills to design and implement cutting-edge VSS solutions that address the evolving security landscape.

  • UNDERSTAND the intention and elements of Video Surveillance Systems (VSS), including situational awareness, intrusion detection, life-safety elements, and the impact of artificial intelligence.
  • MASTER VSS and security network design considerations, such as bandwidth, cabling options, power requirements, equipment location, data storage, and information security.
  • EXPLORE coverage zone planning to meet operational requirements.
  • DETERMINE system requirements based on operational needs, including resolution, lighting, and analytics requirements.
  • IDENTIFY layout and location planning considerations, including environmental factors and accessibility.
  • DESIGN monitoring and control locations, considering incident response and ergonomic factors.
  • LEARN about post-incident analysis using recorded footage features.
  • GAIN INSIGHTS into stakeholder requirements and operational considerations that inform system specifications.
Who will attend

The workshop is ideal for security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users, including:

  • Business continuity, crisis response and strategic risk managers
  • Facilities management managers
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Strategic planners & managers
Trainer

Our Expert Trainer is a skilled security system professional with over 15 years of security system design and implementation experience in various sectors, including expansive public realm systems, high value office and museum developments as well as government and military systems. 

He is fully versed in current security technologies and developments of such systems, capable of designing systems of various complexities and providing information of suitable quality for the whole design process, from concept through to construction level information.

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


[Expert-Led Masterclass] Security Design for Critical Infrastructures & Public Spaces

Overview

This two-day in-depth and hands-on workshop designed to equip you with the essential expertise, knowledge, and strategies for designing foolproof security systems. 

Tailored for those involved in the construction of critical infrastructures and public spaces, you will gain timely insights and practical strategies to effectively safeguard these vital assets.

  • DETERMINE the evidence required to demonstrate security.
  • UNDERSTAND of the Security Management approach to safeguard assets and business processes.
  • INSIGHTS into different modes of operation and their impact on security.
  • IDENTIFY of how facility surroundings can affect security.
  • DEFINE user groups and their security needs.
  • KNOWLEDGE of facility security constraints and objectives.
  • APPLY Operational Requirements (ORs) to inform security system requirements.
  • GAIN AWARENESS of the security risks associated with critical infrastructures and public spaces.
Who will attend

The workshop is ideal for security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users, including:

  • Business continuity, crisis response and strategic risk managers
  • Facilities management managers
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Strategic planners & managers

Professionals from the following sectors:

  • Airport, ports, rail
  • Diplomatic service
  • Education institutions & schools
  • Financial institutions & data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & border control
  • Oil & gas infrastructure
  • Power plant and public utilities
  • Retail, sports and hospitality sectors
Trainer

Expert Trainer has 24 years of experience in security related field. A Chartered Security Professional, he is a member of Lead writing team for ASIS International Physical Assets Protection Standard. He has designed security for the London 2012 Olympic Games Main Stadium, which was the
first stadium to achieve a Secured by Design award.

 

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


[Expert Led Masterclass] Mastering Video Surveillance Systems

Overview

Gain invaluable insights into the latest advancements in VSS technology, including camera types, video analytics, and situational awareness in this masterclass.  Apply what you learned from real-world scenarios and VSS techniques to detect and prevent intrusions, monitor critical areas, and responding effectively to incidents. 

Equip yourself with the knowledge and skills to design and implement cutting-edge VSS solutions that address the evolving security landscape.

  • UNDERSTAND the intention and elements of Video Surveillance Systems (VSS), including situational awareness, intrusion detection, life-safety elements, and the impact of artificial intelligence.
  • MASTER VSS and security network design considerations, such as bandwidth, cabling options, power requirements, equipment location, data storage, and information security.
  • EXPLORE coverage zone planning to meet operational requirements.
  • DETERMINE system requirements based on operational needs, including resolution, lighting, and analytics requirements.
  • IDENTIFY layout and location planning considerations, including environmental factors and accessibility.
  • DESIGN monitoring and control locations, considering incident response and ergonomic factors.
  • LEARN about post-incident analysis using recorded footage features.
  • GAIN INSIGHTS into stakeholder requirements and operational considerations that inform system specifications.
Who will attend

The workshop is ideal for security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users, including:

  • Business continuity, crisis response and strategic risk managers
  • Facilities management managers
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Strategic planners & managers
Trainer

Our Expert Trainer is a skilled security system professional with over 15 years of security system design and implementation experience in various sectors, including expansive public realm systems, high value office and museum developments as well as government and military systems. 

He is fully versed in current security technologies and developments of such systems, capable of designing systems of various complexities and providing information of suitable quality for the whole design process, from concept through to construction level information.

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


[Expert Led Masterclass] Security Design for Critical Infrastructures & Public Spaces

Overview

This two-day in-depth and hands-on workshop designed to equip you with the essential expertise, knowledge, and strategies for designing foolproof security systems. 

Tailored for those involved in the construction of critical infrastructures and public spaces, you will gain timely insights and practical strategies to effectively safeguard these vital assets.

  • DETERMINE the evidence required to demonstrate security.
  • UNDERSTAND of the Security Management approach to safeguard assets and business processes.
  • INSIGHTS into different modes of operation and their impact on security.
  • IDENTIFY of how facility surroundings can affect security.
  • DEFINE user groups and their security needs.
  • KNOWLEDGE of facility security constraints and objectives.
  • APPLY Operational Requirements (ORs) to inform security system requirements.
  • GAIN AWARENESS of the security risks associated with critical infrastructures and public spaces.
Who will attend

The workshop is ideal for security practitioners, architects, designers, policing services and urban planners who have a responsibility for the safe-guarding the built environment, crowded public spaces and their users, including:

  • Business continuity, crisis response and strategic risk managers
  • Facilities management managers
  • Representatives from government agencies
  • Security practitioners & state security agencies
  • Strategic planners & managers

Professionals from the following sectors:

  • Airport, ports, rail
  • Diplomatic service
  • Education institutions & schools
  • Financial institutions & data centres
  • Healthcare
  • Historic buildings, museums, galleries, palaces
  • Industrial & commercial
  • Military & border control
  • Oil & gas infrastructure
  • Power plant and public utilities
  • Retail, sports and hospitality sectors
Trainer

Expert Trainer has 24 years of experience in security related field. A Chartered Security Professional, he is a member of Lead writing team for ASIS International Physical Assets Protection Standard. He has designed security for the London 2012 Olympic Games Main Stadium, which was the
first stadium to achieve a Secured by Design award.

 

Case Studies

To be confirmed.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Orchard Hotel Singapore 

442 Orchard Rd, Singapore 238879

Tel: (65) 6734 7766

Email: Enquiry.OHS@millenniumhotels.com

Website: https://www.millenniumhotels.com/en/singapore/orchard-hotel-singapore/?cid=gplaces-orchard-hotel-singapore

Industry Insights
Brochure Download


[Expert Led Digital Masterclass] Advanced Intelligence Analysis

Overview

This Masterclass will introduce delegates to various techniques and approaches of Intelligence Analysis. The emphasis of the Masterclass is on managing the processes used in the Intelligence Cycle ensuring intelligence is directed, produced and delivered efficiently. Delegates will also learn and practise how to plan and collect information from national and international open and closed sources.

This Masterclass provides opportunities to evaluate and collate information, use different analysis techniques to transform information into intelligence and most importantly how to apply critical thinking techniques and dealing their own biases when gathering information.

What you will learn from this Masterclass:

  • MASTER the methods and tools which are used in intelligence analysis.
  • DIFFERENTIATE the differences between information and intelligence.
  • APPLY critical thinking techniques to information to provide better understanding.
  • UNDERSTAND and exploit the steps of the Intelligence Cycle.
  • USE and FUSE multiple intelligence source to create credible reports.
Who should attend
  • Intelligence Analysts
  • Intelligence Collection Managers
  • Counter Intelligence Investigators
  • Cybercrime Intelligence Officers
  • Law Enforcement Investigators
  • Military Intelligence Officer
  • Security Researchers
Trainer

Our Expert Trainer has more than 20 years’ experience in the British Army Intelligence Corps in which time he worked in various fields including Counter Intelligence, Technical Investigations, Information Assurance (IA), Human Intelligence (HUMINT), Imagery Intelligence (IMINT) and Cyber Security.  He has experience across most strands of the Intelligence world and gained particular insight by undertaking a variety of roles. Our trainer has worked as an operator, analyst and manager and he was the technical investigations subject matter expert (SME) for Army Headquarters.

Our second Expert Trainer has worked in mainland Germany, France, Turkey, Cyprus, Oman, Qatar, Bahrain, the Balkans, Iraq, Afghanistan, and Sierra Leone, and currently teaches intelligence techniques to military staff from across the 29 NATO member nations, African partner nations and also to partners within the defence industry.

Case Studies

Our trainer will use case studies to illustrate the different analytical techniques that are covered in this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about this online course closer to the date of the course.

Brochure Download


[Expert Led Masterclass] Effective Investigative Questioning

Overview

This 2-day workshop is aimed at equipping delegates with the necessary skills and approaches of Security Questioning. Apart from general guidelines and principals of Security Questioning, delegates will learn the how to use tactical questioning to elicit information from suspects. Through this workshop, delegates will be able to apply the skills and knowledge of Security Questioning when dealing with suspicious documentation, human resource and internal investigation.

Most importantly, this workshop will teach delegates how to identify and differentiate between someone with malicious intent and someone who is duped or coerced into committing a crime. To enhance delegates’ learning experience, this workshop includes both theoretical and simulated scenarios (field exercise) to illustrate the application of Security Questioning in day-to-day security operations.

What you will learn from this Masterclass:

  • LEARN how to use tactical questioning to uncover information and intelligence from individuals, suspects and/or convicted criminals and terrorists
  • MASTER different approaches and techniques to questioning.
  • RECOGNISE and DIFFERENTIATE someone with malicious intent and someone who is duped or coerced into becoming a mule.
  • APPLY security questioning as an investigative tool to solve an internal security incident in an organisation.
  • IMPLEMENT effective security questioning processes in your own protected environment.
Who should attend
  • Chief Operations Officer (COO)
  • Chief Security Officer (CSO)
  • Chief Strategy Officer
  • Corporate Security Manager
  • Crisis Response Manager
  • Director of Operations
  • Emergency Management Director and/or Manager
  • Risk Manager and/or Director
  • Security Director and/or Manager
  • Security Supervisor
  • Vice President and/or Director of Security
Trainer

Our Expert Trainer has trained extensively in Australia, New Zealand, Papua New Guinea, USA, Middle East and Asia on predictive profiling, red teaming and security engineering. He has over 30 years security and emergency services experience, including service with the Royal Australian Navy, Victorian, Queensland and NSW Fire and Ambulance Services and senior management positions within the Australian security industry and Papua New Guinea.

Our trainer is a Licensed NSW Security Consultant holding Security Risk Management, Training, Assessment and WH&S Certificates in addition to being a registered NSW security trainer.

He is a regular invited speaker at international security seminars and has been called before Australian Parliament Senate Committee hearings on Organised Crime as an expert witness on profiling and security within the aviation industry.

Case Studies

Tabletop Exercise - Developing and Testing a Cover Story

Delegates will work in groups and receive specific assignments for developing cover stories for specific missions.  They will then be challenged by their peers in the classroom who will test the strength and reliability of the cover story and the ability of the trainee to maintain it against security questioning.

Mall Field Exercise

Delegates will be tasked with specific targets and missions for which they will use their cover stories to gain information and intelligence.

Exercise Debrief

Delegates will brief each other about their experiences in the field. They will also point out weaknesses and strengths in their cover stories and behaviors as individuals and as a group.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about the venue closer to the date of the course.

Brochure Download


[Expert Led Digital Masterclass] The Intelligence Cycle [Fundamentals course]

Overview

This four half-day interactive, detailed and practical workshop will provide the students a solid understanding of the Intelligence Cycle, so that they can apply it in a practical setting. The course will develop the students understanding of the various stages of the Intelligence Cycle – exploring in depth, Direction, Collection, Processing and Dissemination. The course will explore various intelligence collection disciplines, introducing the participants to new concepts for exploitation.

  • Learn the four phases of the Intelligence Cycle and how they function together.
  • Understand the roles and responsibilities of intelligence analysts and officers in the role of the Intelligence Cycle.
  • Develop your understanding of intelligence collection disciplines.
  • Learn and practice valuable processes such as developing intelligence collection plans.
Who should attend
  • The workshop is designed for a range of specialists from across the intelligence community, private sector, Government, Military and Law Enforcement specialists, and those wanting to expand their understanding of the role of intelligence analysts and officers in their field.

    • Law enforcement intelligence specialists
    • Military intelligence specialists
    • Government intelligence specialists
    • Intelligence specialists, officers and analysts
    • Private sector intelligence specialists – for example, those engaged in oil and gas exploration, risk management and security
    • Risk management professionals
    • Those interested in the intelligence community and the role of intelligence in decision-making
Trainer

Our Expert Facilitator

Chris Proops LLB (Hons) PgDip VR is an experienced intelligence practitioner, with  eighteen years miliary knowledge and eight years national and international law enforcement skills.

Chris started his military career in the Royal Anglian Regiment, serving five years and gaining experience of resource management, combat and survival skills, risk management skills and a practical understanding of warfare. Deploying overseas, Chris gained a valuable insight into the role of NATO and international defence.

Perseus Intelligence was created from a passion for sharing knowledge and experience of intelligence, to support those who wish to pursue an exciting and rewarding career. 

Case Studies

Where possible, our facilitator will add relevant case studies during this course.

Partners

Interested to be part of this training?

Please contact us at hello@q8asia.com.sg to discuss your requirements.

Venue

Delegates will receive more information about this online course closer to the date of the course.

Brochure Download