31.01.2017 Views

GLOBAL COURSE PROGRAM 2017

2kQVFhF

2kQVFhF

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>GLOBAL</strong> <strong>COURSE</strong> <strong>PROGRAM</strong> <strong>2017</strong><br />

EUROPE • ASIA • NORTH AMERICA


Contents<br />

Upgrade Your Value Added 2<br />

Open Source Intelligence 4<br />

Advanced OSINT 6<br />

Social Media Intelligence 8<br />

Intelligence Analysis 10<br />

Advanced Intelligence Analysis 12<br />

Strategic Foresight 14<br />

Scenario Planning 16<br />

Risk Management 18<br />

Intelligence Reporting 21<br />

Cybersecurity 23<br />

Competitive Intelligence 25<br />

Intelligence for Sales Professionals 27<br />

<strong>2017</strong> Course Dates and Fees 29<br />

Terms and Conditions 33<br />

Course Logistics 34<br />

Contact Us 36


Upgrade Your Value Added<br />

i-intelligence is recognised as one of the world’s leading providers of training and<br />

advisory services to public and private sector organisations wishing to improve their<br />

intelligence capabilities. Since the company’s founding in 2010, we have trained<br />

analysts and decision makers working in such fields as national security, law<br />

enforcement, counterterrorism, humanitarian intervention, disaster management,<br />

fraud prevention, competitive intelligence, and business development.<br />

Our mission is to provide every professional, regardless of their background, with the<br />

research and analytic capabilities needed to realise their fullest potential. To this end,<br />

our course portfolio covers every step of the intelligence cycle, as well as related<br />

disciplines such as information and knowledge management, risk analysis, and<br />

strategic foresight.<br />

Our public seminars offer an excellent opportunity to sample our approach to<br />

professional training and capacity building. Over the next 12 months, we will be<br />

running more seminars in more locations than ever before. Join us in Brussels,<br />

London, Zurich, New York, Singapore, Hong Kong, or Phnom Penh and learn how to:<br />

• Identify and manage your intelligence requirements<br />

• Automate the collection of mission or business critical data from web and<br />

social media sources using free web tools and technologies<br />

2


• Improve your online privacy and security<br />

• Monitor social media to support strategic and operational decision making<br />

• Protect the physical and digital data assets of your organisation<br />

• Enhance your information and knowledge management capabilities<br />

• Identify and manage risks to your business assets<br />

• Apply scenarios and strategic foresight to issues of concern<br />

• Boost your efficiency and productivity in the workplace<br />

Quality Education<br />

Our seminars offer the perfect blend of theory and practice. Participants will be<br />

introduced to the concepts, models and technologies that inform today’s best<br />

practices, and will be given ample time to experiment with the tools and<br />

methodologies that are taught. In addition to the course slides, participants will<br />

receive a host of supplementary materials including cheat sheets, templates, software<br />

tools and additional reading materials to enable self-study.<br />

Professionally Relevant<br />

Our seminars guarantee measurable outcomes. The curricula have been designed<br />

around professional standards and best practices. We draw on the experience of the<br />

world’s foremost practitioners and use real-world case studies and simulations to help<br />

students internalise lessons learned and apply these skills in the workplace.<br />

Cost Effective<br />

We are committed to making instruction in intelligence and its related disciplines as<br />

affordable as possible. Our seminars have been competitively priced to help<br />

organisations and individuals of all backgrounds acquire and employ a 21st century<br />

skillset.<br />

Who Should Attend<br />

Our seminars are relevant to all professionals, regardless of their background or career<br />

ambitions.<br />

3


Open Source Intelligence<br />

This three-day seminar provides a detailed introduction to the discipline of Open<br />

Source Intelligence (OSINT). Participants will learn how to identify their intelligence<br />

needs and leverage a broad range of tools and sources to improve data collection,<br />

analysis and decision-making in their organisation.<br />

Course Outline<br />

Day 1: Requirements Planning<br />

Introducing OSINT • The varieties of OSINT (online, offline, etc.)<br />

• The benefits and limitations of OSINT<br />

• Strategic and operational dimensions of<br />

OSINT<br />

• Legal and ethical constraints<br />

Managing Requirements • Working with intelligence customers<br />

• Identifying collection requirements<br />

• The Key Intelligence Topics (KITs) process<br />

• Collection planning<br />

• Collection frameworks<br />

Day 2: Effective Web Exploitation<br />

Automating Intelligence<br />

Collection<br />

• Establishing a keyword index<br />

• Working with data aggregators<br />

• Generating data from the web<br />

• Generating data from social media<br />

• Working with alert services<br />

• Essential browser tools and extensions<br />

Searching the Web • Search strategies<br />

• Search operators<br />

• Recommended search engines<br />

• Searching the deep web<br />

• Building a customised search engine<br />

• Working with databases and directories<br />

• Maintaining an audit trail<br />

• Essential browser tools and extensions<br />

4


Day 3: Security and Data Management<br />

Safer Searching • Privacy, anonymity and proxy tools<br />

• Developing a sockpuppet<br />

• Working with Tor and the Dark Web<br />

Data Management and<br />

Exploitation<br />

• Validating your search results<br />

• Data processing and enrichment<br />

• Organising data for analysis<br />

• Working with data collation tables<br />

• The pre-analysis checklist<br />

Course Benefits<br />

On completion of this course, participants will have acquired the ability to:<br />

• Identify and manage their intelligence requirements<br />

• Improve the quality, accuracy and relevance of their search results<br />

• Automate the collection of data from the web and social media sources<br />

• Build a personal monitoring system to support strategy and decision making<br />

• Improve online privacy, anonymity and security<br />

• Organise data to identify knowledge gaps and support effective analysis<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up a Gmail and Twitter<br />

account if they do not already have one.<br />

5


Advanced OSINT<br />

This three-day seminar builds on the content of our introductory OSINT course. The<br />

objective here is to extend the OSINT professional’s skillset. In addition to enhancing<br />

their knowledge of valuable search tools and intelligence resources, we will provide<br />

guidance on the tools needed to conduct rigorous, legally compliant investigations<br />

of organisations, individuals and websites.<br />

Course Outline<br />

Day 1: Advanced OSINT<br />

Advanced Data Collection • Feed manipulation and processing tools<br />

• Task automation tools<br />

• Searching beyond Google<br />

• Web rippers and scrapers<br />

• XPath, regular expressions, DOM structures<br />

• Working with open data and APIs<br />

Open Source Geospatial<br />

Intelligence<br />

• Maps and mapping tools<br />

• Working with geolocational data<br />

• Leveraging data from social media<br />

Day 2: Web Investigations I<br />

Investigating Websites • Whois, DNS and IP tools<br />

• Identifying site ownership<br />

• Site mapping<br />

• Metadata exploitation<br />

• Unique identifiers on the web<br />

Investigating Organisations • Due diligence frameworks<br />

• Investigating ownership<br />

• Investigating subsidiaries<br />

• Identifying clients and business partners<br />

• Monitoring an organisations online footprint<br />

6


Day 3: Web Investigations II<br />

Investigating Individuals • Finding people online<br />

• Mapping an individual’s online footprint<br />

• Screen name investigations<br />

• Finding and validating email addresses<br />

• Email tracing and traffic analysis<br />

• Developing a digital profile<br />

• Legal and ethical considerations<br />

Working with Maltego • Set up and configuration<br />

• Working with entities and transforms<br />

• Running and editing a project<br />

• Supporting tools<br />

Course Benefits<br />

On completion of this course, participants will have acquired the ability to:<br />

• Apply a broader array of search tools and intelligence sources<br />

• Leverage geospatial data for strategic and operational intelligence purposes<br />

• Identify the ownership and provenance of websites and other resources<br />

• Conduct investigations on organisations and individuals of interest<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up a Gmail, Yahoo<br />

and Twitter account if they do not already have one. Additional software requirements<br />

will be sent prior to the start of the course.<br />

We strongly recommend that participants on our Advanced OSINT program first take<br />

our Open Source Intelligence seminar to ensure they understand the technical<br />

standards and operating principles that underpin our approach to data collection and<br />

analysis.<br />

7


Social Media Intelligence<br />

This three-day course will demonstrate how to generate strategic and operational<br />

intelligence from social media sources. Participants will be shown how to collect,<br />

process, and analyse social medial intelligence (SOCMINT) from a variety of networks<br />

and platforms. Further, they will be shown how to identify and monitor specific voices,<br />

issues and conversations. Finally, they will be shown how to conduct rigorous people<br />

investigations using a broad range of social media services.<br />

Course Outline<br />

Day 1: Mining Social Networks<br />

Establishing Your<br />

SOCMINT Toolkit<br />

• Configuring your browser<br />

• Extending your search capabilities<br />

• Developing keyword indices<br />

• Research tools and extensions<br />

• Content curation / management tools<br />

Automating SOCMINT<br />

Collection<br />

• Monitoring frameworks and approaches<br />

• Keyword / hashtag discovery and validation<br />

• Source discovery and validation<br />

• Recommended tools, apps and extensions<br />

• Establishing a monitoring dashboard<br />

Working with Social<br />

Networks<br />

• Working with Facebook, VK, LinkedIn, etc.<br />

• Finding and monitoring users and groups<br />

• Mining social networks for SOCMINT<br />

• Using third party tools and search services<br />

• Generating user stats and analytics<br />

Day 2: SOCMINT II<br />

Working with Twitter<br />

and Instagram<br />

• Finding, monitoring and geolocating users<br />

• Monitoring geolocated content<br />

• Generating user stats and analytics<br />

• Automating data collection<br />

• Search and content discovery tools<br />

• Third party dashboards and extensions<br />

8


Blogs and Discussions<br />

Boards<br />

• Mining blogging platforms for intelligence<br />

• Working with visual blogs (Pinterest, Tumblr)<br />

• Working with Reddit and discussion boards<br />

• Determining reach and influence<br />

Foreign Language SOCMINT • Mapping the SOCMINT universe<br />

• Mining foreign language sources<br />

• Working with translation tools and extensions<br />

Day 3: Online Investigations<br />

Getting Started • The investigative process<br />

• Working with target profiles and templates<br />

• Maintaining privacy and security online<br />

Investigating Individual<br />

Users<br />

• Finding people online<br />

• Mapping an individual’s online footprint<br />

• Screen name investigations<br />

• Unmasking hidden identities<br />

Course Benefits<br />

On completion of this course, participants will have acquired the ability to:<br />

• Monitor a broad range of social media sources, including non-Western ones<br />

• Identify and follow leading voices and opinion makers<br />

• Track the evolution of critical conversations and ideas<br />

• Apply free tools and standard office software to analyse the data collected<br />

• Use SOCMINT to support strategic planning, risk management and crisis<br />

response<br />

• Conduct online investigations in a legal and ethically appropriate manner<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up an anonymous<br />

Gmail, Twitter, Instagram, V-Kontakte and Facebook accounts if they do not already<br />

have them. Additional software requirements will be sent prior to the start of the<br />

course.<br />

9


Intelligence Analysis<br />

Our introductory course to intelligence analysis provides a solid introduction to the<br />

art and science of analytic reasoning. Participants will be given the foundational<br />

knowledge needed to establish and grow their analytic toolkit. Attention is given to<br />

descriptive and predictive modes of analysis, and the complimentary skills of trend<br />

identification, pattern detection, evidential reasoning, and ideation. The guidance<br />

provided by this course offers an essential prelude to our more advanced courses.<br />

Course Outline<br />

Day 1: Issue identification<br />

Introduction to<br />

Intelligence Analysis<br />

Analytic Thinking and<br />

Reasoning Skills<br />

• What is analysis?<br />

• The three modes of analytic reasoning<br />

• The challenge of analysis<br />

• The role of the analyst<br />

• The critical disciplines of analytic work<br />

• The current state-of-the-art<br />

• Critical, creative and conceptual thinking<br />

• Sensemaking and calibration<br />

• Problem identification and solving<br />

• Identifying trends, patterns and relationships<br />

• Evidential reasoning<br />

• Scoping and managing your uncertainty<br />

• Measuring and monitoring your thinking<br />

• Working with structured analytic techniques<br />

Ideation Skills • Brainstorming techniques<br />

• Idea enhancement techniques<br />

• Mind mapping<br />

• Concept mapping<br />

Day 2: Descriptive Analysis<br />

Descriptive Analytic<br />

Techniques<br />

• The 5W1H Model<br />

• Causal mapping<br />

• Causal factor chains<br />

• Causal loop diagrams<br />

• Actor / factor analysis<br />

• Working with timelines<br />

• Link / association charting<br />

10


Day 3: Predictive Analysis<br />

Predictive Analytic<br />

Techniques<br />

• Hypothesis generation<br />

• Trend / impact analysis<br />

• What if analysis<br />

• Impact / probability analysis<br />

• The futures wheel<br />

• Consequence trees<br />

Course Benefits<br />

On completion of this course, participants will have acquired the ability to:<br />

• Justify the importance of structured approaches to analytic thinking<br />

• Apply a range of critical and creative thinking skills<br />

• Develop causal narratives using descriptive analytic techniques<br />

• Anticipate future outcomes using predictive analytic techniques<br />

• Identify and explore cause-and-effect relationships<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up a Gmail account if<br />

they do not already have one.<br />

11


Advanced Intelligence Analysis<br />

Our Advanced Intelligence Analysis course looks to extend the toolkit provided in our<br />

introductory program. Participants will learn how to identify and explore multiple lines<br />

of analytic enquiry, most notably via the Analysis of Competing Hypothesis. Next,<br />

they will be shown how to identify practical solutions to the issues they are dealing<br />

with using prescriptive models such as roadmapping and cost-benefit analysis. The<br />

course ends by showing analysts how to critique the work of their peers and manage<br />

the cognitive biases common to all professionals.<br />

Course Outline<br />

Day 1: Predictive Reasoning<br />

Predictive Analytic<br />

Techniques<br />

• Multiple hypothesis generation<br />

• The Analysis of Competing Hypotheses<br />

• Developing indicators and watchlists<br />

Day 2: Prescriptive Analysis<br />

Prescriptive Analytic<br />

Techniques<br />

• If / then analysis<br />

• Opportunity analysis<br />

• Developing roadmaps and solution pathways<br />

• Feasibility analysis<br />

• Course of action analysis<br />

• Critical path analysis<br />

• Cost-benefit analysis<br />

Day 3: Challenge Analysis<br />

Challenge Analysis<br />

Techniques<br />

Cognitive Challenges to<br />

Analysis<br />

• Structured self-critique<br />

• Pre-Mortem analysis<br />

• Red teaming<br />

• Team A / Team B method<br />

• Devils advocacy<br />

• A typology of cognitive pathologies<br />

• Perception, memory, and reasoning<br />

limitations<br />

• Dealing with mindsets, blind spots and biases<br />

• Bias mitigation strategies<br />

12


Course Benefits<br />

On completion of this course, participants will have acquired the ability to:<br />

• Generate and evaluate multiple hypotheses using the ACH methodology<br />

• Identify and articulate viable policy prescriptions or problem solutions<br />

• Engage in multiple forms of challenge analysis, including Red Teaming and<br />

Devil’s Advocacy<br />

• Understand the risks posed by bias and other cognitive pathologies<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up a Gmail account if<br />

they do not already have one.<br />

13


Strategic Foresight<br />

Our course on Strategic Foresight introduces participants to a unique portfolio of<br />

analytic skills. Emphasis here is given to the many tools that support predictive<br />

reasoning. Participants will be shown how to scan their operating environment for<br />

indicators of change, and how to amplify and analyse these trends to help their<br />

organisation anticipate future challenges and opportunities.<br />

Course Outline<br />

Day 1: Strategic Anticipation and Issue Identification<br />

Strategic Anticipation • Sensing the future: how and why<br />

• The four levels of proactiveness<br />

• Outside in vs. inside out thinking<br />

• Understanding the dynamics of change<br />

Scanning the Future • Environmental Scanning<br />

• Trend analysis<br />

• Impact assessments<br />

Cultivating Foresight • Perspective taking<br />

• Mapping your uncertainty<br />

• Precision questioning and answering<br />

• The role of constructive confrontation<br />

Day 2: Working with Weak Signals<br />

Identifying Signals • Weak signal identification<br />

• Weak signal amplification<br />

Analysing Signals • Identifying critical uncertainties<br />

• Weak signal analysis<br />

• Establishing hypotheses<br />

• Identifying key risk indicators<br />

Monitoring Signals • Identifying intelligence sources<br />

• Defining a monitoring strategy<br />

• Maintaining a watchlist<br />

14


Day 3: Analytic Techniques for Strategic Foresight<br />

Analytic Tools and<br />

Techniques<br />

• Visioning<br />

• Backcasting<br />

• Shell’s seven questions<br />

• What if analysis<br />

• The futures wheel<br />

• Consequence trees<br />

• The Lidoli abacus<br />

• Impact / probability analysis<br />

Course Benefits<br />

On completion of this course, participants will have acquired the ability to:<br />

• Establish strategic foresight as an institutional / operational capability<br />

• Identify, analyse and monitor weak signals and other change indicators<br />

• Apply a range of foresight techniques to explore risk / crisis scenarios<br />

• Think critically and creatively about future challenges to one’s organisation<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up a Gmail account if<br />

they do not already have one.<br />

15


Scenario Planning<br />

Our Scenario Planning program offers a structured approach to exploring alternate<br />

futures and their potential impact on one’s organisation. Participants will be given<br />

detailed guidance on how to identify and analyse those trends that are likely to shape<br />

their market or operating environment. They are then shown how to use these trends<br />

to construct plausible narratives of potential futures, and develop the necessary<br />

contingencies, strategies or action plans to meet them with confidence.<br />

Course Outline<br />

Day 1: Identifying Strategic Trends<br />

Introduction to Scenario<br />

Planning<br />

Scanning for Strategic<br />

Trends<br />

• A brief history of scenario planning<br />

• Benefits and limitations<br />

• Scenario thinking vs. scenario planning<br />

• The varieties of scenarios<br />

• Identifying and prioritising strategic trends<br />

• Mapping drivers and potential impacts<br />

• Causal loop mapping<br />

• Identifying critical uncertainties<br />

Day 2: Developing Scenarios<br />

Developing Scenarios • The three futures calibration model<br />

• Plotting timelines<br />

• Selecting the key axes of uncertainty<br />

• Working with consequence radars<br />

• Defining stakeholder actions / reactions<br />

• Drafting scenario narratives<br />

Reporting Scenarios • The elements of effective storytelling<br />

• Structuring your scenario reports<br />

• Alternative scenario communication strategies<br />

Day 3: From Scenarios to Strategies<br />

Translating Scenarios into<br />

Strategies<br />

• From analytic insights to strategic objectives<br />

• Identifying and analysing strategic options<br />

• Identifying strategic opportunities<br />

• Evaluating strategic fit<br />

16


• Developing contingencies<br />

• Action planning<br />

• Means-End Analysis<br />

• The Plan–Do–Check–Act model<br />

• Resource planning<br />

• Implementation<br />

Course Benefits<br />

On completion of this course, participants will have acquired the ability to:<br />

• Identify, analyse and monitor the strategic trends that are likely to impact their<br />

organisation or operating environment<br />

• Imagine and explore multiple futures and their consequences<br />

• Select a desired future and the steps needed to realise it<br />

• Define contingency and action plans in preparation for an uncertain future<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up a Gmail account if<br />

they do not already have one.<br />

17


Risk Management<br />

This four-day program provides a comprehensive introduction to the discipline of risk<br />

management. Participants will be shown how to identify and evaluate the risks to their<br />

organisation. Thereafter, they will be given the tools they need to establish the<br />

necessary risk controls and mitigation strategies. The program ends with detailed<br />

guidance on effective risk communication to one’s stakeholders.<br />

Course Outline<br />

Day 1: Risk Identification<br />

Understanding Risk • A brief history of risk<br />

• Risk theory and definitions<br />

• Understanding the many forms of risks<br />

Risk Identification • Mapping the risk landscape<br />

• Identifying risk sources and motivations<br />

• Identifying key assets<br />

• Identifying vulnerabilities and threats<br />

• Generating risk intelligence<br />

Day 2: Risk Analysis<br />

Analytic Tools for Risk<br />

Analysis<br />

• What if analysis<br />

• Fault trees<br />

• Attack trees<br />

• Decision trees<br />

• Impact analysis<br />

• Decision matrices<br />

Risk Evaluation • Developing and maintaining a risk taxonomy<br />

• Analysing impact, probability, severity and<br />

urgency<br />

• Qualitative and quantitative risk analysis<br />

• Working with risk matrices<br />

• Developing risk indicators<br />

18


Day 3: Risk Management<br />

Risk Management • Contemporary management theories<br />

• Models, frameworks and approaches<br />

• The risk management toolkit<br />

Operationalising Risk<br />

Management<br />

• Risk prioritisation<br />

• Defining and implementing risk controls<br />

• Developing a risk management strategy<br />

• Developing and maintaining a risk register<br />

• Risk monitoring: methods and approaches<br />

• Risk reviews and audits<br />

Risk Intelligent Organisation • Characteristics of a risk intelligent organisation<br />

• Building a risk-tolerant culture<br />

• Learning to take risks<br />

• The role of the risk officer<br />

Day 4: Risk Communication<br />

Introducing Risk<br />

Communication<br />

Developing a Risk<br />

Communication Plan<br />

• The many forms of risk communication<br />

• Communication models and approaches<br />

• Establishing and validating the risk<br />

communication process<br />

• Identifying stakeholders and their<br />

requirements<br />

• Structuring your message for effect<br />

• Selecting your communication channel<br />

• Communicating uncertainty<br />

• Managing the response<br />

• Best practices in risk reporting<br />

19


Course Benefits<br />

On completion of this course, participants will have acquired knowledge of:<br />

• Best practices in risk identification, analysis, management and control<br />

• The application of risk management models to identify internal and external<br />

challenges to an organisation’s assets<br />

• Frameworks for improving decision making and the management of<br />

uncertainty<br />

• Guidance on operationalising the techniques taught in the workplace<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up a Gmail<br />

account if they do not already have one.<br />

20


Intelligence Reporting<br />

This course provides a detailed introduction to the development and delivery of<br />

intelligence products, both written and oral. Participants will be given a general<br />

introduction to intelligence reporting and given guidance on drafting copy that is<br />

crisp and clear. From there, they will be shown how to structure and develop long and<br />

short-form intelligence products. The course goes on to provide guidance on the<br />

delivery of effective oral briefings and presentations.<br />

Course Outline<br />

Day 1: Writing Skills<br />

General Reporting Principles • Knowing your audience<br />

• Constructing and testing your arguments<br />

• Communicating risk and warning<br />

• Communicating analytic confidence<br />

Writing Skills • Effective writing skills<br />

• Writing to the Minto Pyramid<br />

• Referencing your work<br />

• Self-editing and proofing<br />

• Peer-editing and evaluation<br />

Day 2: Developing Analytic Products<br />

Analytic Products • The varieties of analytic product<br />

• Developing and working with templates<br />

• Drafting alerts<br />

• Drafting briefs and situation assessments<br />

• Drafting estimates, reports and forecasts<br />

• Generating customer feedback<br />

Making Recommendations • Developing options<br />

• Generating SMART recommendations<br />

21


Day 3: Briefings and Presentations<br />

Presentations and Oral<br />

Briefings<br />

• Developing presentations<br />

• Multimedia intelligence products<br />

• Preparing for a briefing<br />

• Effective presentation skills<br />

• Handling questions and objections<br />

• Managing your audience<br />

Course Benefits<br />

On completion of this course, participants will have acquired the ability to:<br />

• Construct arguments that are logical and supported by evidence<br />

• Employ simple rules to improve the quality and clarity of their writing<br />

• Draft long and short form products that are support customer needs<br />

• Develop and deliver oral briefings that address the audience’s descriptive,<br />

predictive and prescriptive information needs<br />

• Generate constructive feedback from one’s customers and peers<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up a Gmail account if<br />

they do not already have one.<br />

22


Cybersecurity<br />

This three-day program provides a detailed introduction to the discipline of<br />

cybersecurity. Participants will be shown how to mitigate a range of cyber threats, and<br />

how to improve their privacy and security online. Further, they will apply the tools and<br />

techniques common to hackers to measure their own vulnerability and that of their<br />

organisation. Guidance is also given on how to manage the physical threats to an<br />

organisation’s information assets.<br />

Course Outline<br />

Day 1: Key Risks and Vulnerabilities<br />

The Internet • The Internet: What it is and how it works<br />

• Key protocols and standards<br />

• Critical infrastructures and their vulnerabilities<br />

• Internet security: thinking in systems<br />

Cyber Risks • Malware<br />

• Phishing<br />

• Cyber espionage<br />

• Cyber extortion<br />

• Denial of service attacks<br />

• Wireless and mobile vulnerabilities<br />

• Minimising Internet surveillance<br />

• Mitigating cyber risks<br />

Day 2: The Hacker Threat<br />

Hacking and Hackers • How hackers work<br />

• The hacker’s mindset<br />

• The hacker’s toolkit<br />

• The hacker’s methodology<br />

• Social engineering<br />

• Reducing your exposure to hackers<br />

Personal Cyber Security • Privacy and security online<br />

• Working with proxy tools<br />

• Effective password security<br />

• Reducing your digital footprint<br />

• The risks of oversharing<br />

23


Day 3: Information Risk Management<br />

Information Risk<br />

Management<br />

• The principles of risk management<br />

• Asset identification and evaluation<br />

• Identifying information vulnerabilities<br />

• Implementing information risk controls<br />

• Business continuity planning<br />

Physical Security • Identifying vulnerabilities<br />

• Testing your physical security<br />

• The “insider threat”<br />

• Mitigating non-digital risks<br />

Course Benefits<br />

On completion of this course, participants will have acquired the ability to:<br />

• Understand the Internet, how it works and its vulnerabilities<br />

• Mitigate the most prevalent cyber risks using essential best practices<br />

• Apply the tools used by hackers to build a security / target profile<br />

• Identify, evaluate and mitigate digital and physical risks to one’s information<br />

assets<br />

• Develop a business continuity plan in the event of a security incident<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up an anonymous<br />

Gmail, Twitter and Facebook account if they do not already have one. Additional<br />

software requirements will be sent prior to the start of the course.<br />

24


Competitive Intelligence<br />

This three-day course provides a general introduction to the practice of competitive<br />

intelligence (CI). Participants will receive training in a broad range of research and<br />

analytic skills. These will help them to identify and manage their organisation’s<br />

information needs; improve their primary and secondary research skills; use different<br />

media monitoring tools; and employ a broad range of analytic techniques to profile<br />

competitors, evaluate markets, anticipate risks, and improve decision-making.<br />

Course Outline<br />

Day 1: Requirements Planning<br />

The Practice of CI • Understanding the value of CI<br />

• The competitive intelligence cycle<br />

• What CI can and can’t do<br />

• Legal and ethical constraints of CI<br />

Managing Requirements • Working with intelligence customers<br />

• Identifying collection requirements<br />

• The Key Intelligence Topics (KITs) process<br />

• Collection planning<br />

• Collection frameworks<br />

Day 2: Data Collection<br />

Effective Internet Exploitation • Working with keywords<br />

• Search strategies<br />

• Search engines and operators<br />

• Automating data collection<br />

• Alert services<br />

• Working with the Deep Web<br />

• Working with Social Media<br />

• Building a customized search engine<br />

• Essential browser tools and extensions<br />

25


Investigating Competitors • Company profiling<br />

• Identifying management and ownership<br />

• Working with official records<br />

• Working with satellite / imagery sources<br />

• Sources of financial data<br />

Day 3: Market and Competitor Analysis<br />

Analysing Market and<br />

Competitor Intelligence<br />

• Analytical techniques to evaluate your<br />

business, competitors and operating<br />

environment<br />

• Cognitive biases and business blindspots<br />

• Learning from feedback and “failure”<br />

Establishing a CI Unit • Guidelines for establishing and running a<br />

CI practice in your organisation<br />

Course Benefits<br />

On completion of this course, participants will have acquired the ability to:<br />

• Identify and manage their intelligence requirements<br />

• Improve the quality, accuracy and relevance of their search results<br />

• Automate the collection of data from the web and social media<br />

• Employ simple frameworks to analyse data on competitors and markets<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up a Gmail and Twitter<br />

account if they do not already have one.<br />

26


Intelligence for Sales Professionals<br />

Whether you are a young entrepreneur or a veteran sales professional, the ability to<br />

find and win new business is critical to the success of your organisation. This two-day<br />

seminar provides a practical, intelligence-led approach to lead generation, key<br />

account management and business growth. Participants will be taught how to identify<br />

and monitor new leads, gather data using free online tools, generate lead maps, and<br />

embed simple intelligence workflows into their key account processes.<br />

Course Outline<br />

Day 1: Scoping and Preparation<br />

Planning Your Sales Research • The intelligence process and your sales<br />

strategy<br />

• Identifying your key intelligence requirements<br />

• Developing your research plan<br />

• Identifying relevant sources, data and trends<br />

Intelligence for Key Account<br />

Management<br />

• Scoping your market(s)<br />

• Identifying and monitoring customer’s needs<br />

• Generating industry and regulatory insights<br />

• Monitoring competitor strategies and tactics<br />

• Establishing your key accounts / market<br />

segments<br />

• Building your target lists<br />

• Defining your value proposition<br />

• Developing your sales strategy and objectives<br />

• Establishing an intelligence-led sales process<br />

• Measurement, reporting and analytics<br />

Day 2: Generating Sales Intelligence<br />

Generating Actionable<br />

Sales Intelligence<br />

• The fundamentals of Internet research<br />

• Identifying and validating leads and potentials<br />

• Monitoring the web and social media<br />

• Monitoring government sources for public<br />

tenders<br />

27


• Aggregating contact data with site scrapers<br />

• Generating sales maps with Excel, Fusion<br />

Tables and Google Maps<br />

• Establishing an open-source CRM in the cloud<br />

Course Benefits<br />

On completion of this course, participants will have acquired the ability to:<br />

• Identify and monitor new leads and business opportunities<br />

• Gather sales intelligence using online tools and sources<br />

• Embed simple intelligence workflows into their key account processes<br />

• Generate lead maps so as to better coordinate client visits<br />

• Establish a free, open source CRM solution in the cloud<br />

• Use web-based tools to enhance productivity and effectiveness<br />

Course Requirements<br />

Participants are required to bring a laptop with them and to set up a Gmail account if<br />

they do not already have one.<br />

28


<strong>2017</strong> Course Dates and Fees<br />

Brussels<br />

Seminar Dates Fee<br />

Open Source Intelligence<br />

20 - 22 March<br />

9 - 11 October<br />

Corporate: EUR 1,000<br />

Non-Profit: EUR 800<br />

Student: EUR 500<br />

Advanced OSINT<br />

23 - 25 March<br />

12 - 14 October<br />

Corporate: EUR 1,000<br />

Non-Profit: EUR 800<br />

Student: EUR 500<br />

Social Media Intelligence<br />

27 - 29 March<br />

16 - 18 October<br />

Corporate: EUR 1,000<br />

Non-Profit: EUR 800<br />

Student: EUR 500<br />

Intelligence Analysis 30 March - 1 April Corporate: EUR 1,000<br />

Non-Profit: EUR 800<br />

Student: EUR 500<br />

Strategic Foresight 3 – 5 April Corporate: EUR 1,000<br />

Non-Profit: EUR 800<br />

Student: EUR 500<br />

Advanced Intelligence Analysis 19 - 21 October Corporate: EUR 1,000<br />

Non-Profit: EUR 800<br />

Student: EUR 500<br />

Intelligence Reporting 23 – 25 October Corporate: EUR 1,000<br />

Non-Profit: EUR 800<br />

Student: EUR 500<br />

Scenario Planning 26 – 28 October Corporate: EUR 1,000<br />

Non-Profit: EUR 800<br />

Student: EUR 500<br />

29


Zurich<br />

Seminar Dates Fees<br />

Competitive Intelligence 29 - 31 May CHF 1,000<br />

Intelligence for Sales Professionals 1 - 2 June CHF 800<br />

Open Source Intelligence 4 - 6 December CHF 1,000<br />

London<br />

Seminar Dates Fees<br />

Open Source Intelligence 26 - 28 June GBP 800<br />

Advanced OSINT 29 June - 1 July GBP 800<br />

Social Media Intelligence 3 - 5 July GBP 800<br />

New York<br />

Seminar Dates Fees<br />

Open Source Intelligence 1 – 3 May US$ 1,000<br />

Social Media Intelligence 4 – 6 May US$ 1,000<br />

30


Hong Kong<br />

Seminar Dates Fee<br />

Open Source Intelligence 18 - 20 May HKD 8,500<br />

Advanced OSINT 22 - 24 May HKD 8,500<br />

Social Media Intelligence 25 - 27 May HKD 8,500<br />

Competitive Intelligence 6 – 8 November HKD 8,500<br />

Intelligence for Sales Professionals 9 – 10 November HKD 8,500<br />

Singapore<br />

Seminar Dates Fees<br />

Open Source Intelligence 13 - 15 March SGD 1,500<br />

Advanced OSINT 16 - 18 March SGD 1,500<br />

Intelligence Analysis 3 - 5 April SGD 1,500<br />

Advanced Intelligence Analysis 6 - 8 April SGD 1,500<br />

Competitive Intelligence 10 - 12 April SGD 1,500<br />

Intelligence for Sales Professionals 13 – 14 April SGD 1,000<br />

Social Media Intelligence 9 – 11 October SGD 1,500<br />

Scenario Planning 12 – 14 October SGD 1,500<br />

Strategic Foresight 16 – 18 October SGD 1,500<br />

31


Phnom Penh*<br />

Seminar<br />

Open Source Intelligence<br />

Intelligence Analysis<br />

Social Media Intelligence<br />

Advanced OSINT<br />

Advanced Intelligence Analysis<br />

Competitive Intelligence<br />

Intelligence for Sales Professionals<br />

Risk Management<br />

Scenario Planning<br />

Strategic Foresight<br />

Cybersecurity<br />

Dates<br />

2 - 4 March<br />

6 - 8 March<br />

9 - 11 March<br />

5 - 7 June<br />

8 - 10 June<br />

3 - 5 July<br />

6 - 7 July<br />

10 - 13 July<br />

14 - 16 August<br />

17 – 19 August<br />

21 – 23 August<br />

*All seminars in Cambodia will be administered by our partner Plus 7 International<br />

(www.plus7international.com). Please contact them for registration information.<br />

Notes<br />

Seminars outside of Switzerland are not charged VAT. All course fees are<br />

inclusive of three months of post-course support for participants.<br />

32


Terms and Conditions<br />

Payment<br />

Unless otherwise agreed, payment should be made in advanced of the course to an<br />

account specified by the organisers. Late payments are liable to a 10 per cent charge.<br />

Group Discounts<br />

Organisations wishing to send two or more participants are eligible for a 10 per cent<br />

discount on the course fee. Please contact us for more information.<br />

Course Confirmation Policy<br />

All courses will be confirmed one month prior to the start date. Participants are<br />

advised not to make any travel arrangements until they receive notification that the<br />

course will proceed. We recommend that any arrangements made before this time<br />

be fully refundable.<br />

Cancellation Policy<br />

Participants cancelling within one week of a seminar’s start date will be charged 80<br />

per cent of the course fee. Participants cancelling more than one week before the<br />

start date will receive a refund minus an administrative fee of EUR 100.<br />

If you cannot attend, you are welcomed to have someone attend in your place and<br />

so avoid losing your registration fee.<br />

Changes to the Course Agenda<br />

i-intelligence reserves the right to cancel the course if there is an insufficient number<br />

of registrations. You will be given adequate notice if this is the case.<br />

33


Course Logistics<br />

Number of Participants<br />

The maximum number of participants per seminar is 15. This ensures a greater level<br />

of engagement, collaboration and guidance from the instructor.<br />

Technical Requirements<br />

Participants are required to bring a laptop with them and should have administrative<br />

rights access to this device. Detailed software requirements for each course will be<br />

sent prior to the start of every seminar.<br />

Course Hours<br />

The seminars will run from 9:00 am to 5:00 pm. This includes a one-hour break for<br />

lunch and two twenty-minute coffee breaks. Lunch, coffee and snacks will be provided<br />

to participants.<br />

Location<br />

All seminars will take place in the central business district of the respective city with<br />

convenient access to public transportation. The exact location of each seminar will be<br />

communicated to participants prior to the course commencing.<br />

Language of Instruction<br />

The language of instruction, and all course materials, will be in English.<br />

34


Organizer and Instructors<br />

About i-intelligence<br />

i-intelligence is a commercial intelligence consultancy based in Zurich, Switzerland.<br />

Established in 2010, the company provides research, training and advisory services to<br />

public and private sector organisations around the globe. Our course portfolio covers<br />

the entire intelligence cycle as well as related disciplines such as information and<br />

knowledge management, futures and foresight and risk and strategy analysis. The<br />

company’s clients include EU and UN institutions, international organisations, NATO,<br />

ministries of defence and foreign affairs, Fortune 500 companies and enterprising<br />

SMEs.<br />

About the Instructors<br />

The courses will be led by Chris Pallaris, Aleksandra Bielska or Vytenis Benetis.<br />

Chris Pallaris is Director and Principal Consultant of i-intelligence. He has over 15 years<br />

of experience as an analyst and 10 as a teacher. In addition to client work, he is an<br />

Associate Lecturer at Mercyhurst University's Institute for Intelligence Studies. He also<br />

teaches courses in the domain of strategic intelligence and knowledge management<br />

at the ZHAW's School of Management and Law, and ETH Zurich.<br />

Vytenis Benetis is the Director of i-intelligence in Asia. Vytenis has worked as an<br />

intelligence analyst for almost a decade. His professional experience covers a wide<br />

range of missions and organizations including the Lithuanian Ministry of Defence,<br />

NATO, and the European Union on both the operational and strategic level. Vytenis<br />

has delivered training to public and private sector organisations around the world.<br />

Aleksandra Bielska is an educator, analyst and consultant specialising in the collection,<br />

analysis and management of intelligence. As an educator, she has taught intelligence<br />

theory and practice to public and private sector organisations, including at NATO’s<br />

Centre of Excellence in the Defence Against Terrorism in Ankara, Turkey, and at the<br />

NATO School in Oberammergau, Germany. Her experience covers the entire gamut<br />

of intelligence disciplines including data collection, information and knowledge<br />

management, and strategic foresight.<br />

35


Contact Us<br />

i-intelligence | Europe<br />

Chris Pallaris<br />

Tel: +41 (0) 43 243 3849<br />

Email: info@i-intelligence.eu<br />

i-intelligence | Asia<br />

Vytenis Benetis<br />

Tel: +7 747 419 4165<br />

Email: v.benetis@i-intelligence.eu<br />

36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!