GLOBAL COURSE PROGRAM 2017
2kQVFhF
2kQVFhF
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>GLOBAL</strong> <strong>COURSE</strong> <strong>PROGRAM</strong> <strong>2017</strong><br />
EUROPE • ASIA • NORTH AMERICA
Contents<br />
Upgrade Your Value Added 2<br />
Open Source Intelligence 4<br />
Advanced OSINT 6<br />
Social Media Intelligence 8<br />
Intelligence Analysis 10<br />
Advanced Intelligence Analysis 12<br />
Strategic Foresight 14<br />
Scenario Planning 16<br />
Risk Management 18<br />
Intelligence Reporting 21<br />
Cybersecurity 23<br />
Competitive Intelligence 25<br />
Intelligence for Sales Professionals 27<br />
<strong>2017</strong> Course Dates and Fees 29<br />
Terms and Conditions 33<br />
Course Logistics 34<br />
Contact Us 36
Upgrade Your Value Added<br />
i-intelligence is recognised as one of the world’s leading providers of training and<br />
advisory services to public and private sector organisations wishing to improve their<br />
intelligence capabilities. Since the company’s founding in 2010, we have trained<br />
analysts and decision makers working in such fields as national security, law<br />
enforcement, counterterrorism, humanitarian intervention, disaster management,<br />
fraud prevention, competitive intelligence, and business development.<br />
Our mission is to provide every professional, regardless of their background, with the<br />
research and analytic capabilities needed to realise their fullest potential. To this end,<br />
our course portfolio covers every step of the intelligence cycle, as well as related<br />
disciplines such as information and knowledge management, risk analysis, and<br />
strategic foresight.<br />
Our public seminars offer an excellent opportunity to sample our approach to<br />
professional training and capacity building. Over the next 12 months, we will be<br />
running more seminars in more locations than ever before. Join us in Brussels,<br />
London, Zurich, New York, Singapore, Hong Kong, or Phnom Penh and learn how to:<br />
• Identify and manage your intelligence requirements<br />
• Automate the collection of mission or business critical data from web and<br />
social media sources using free web tools and technologies<br />
2
• Improve your online privacy and security<br />
• Monitor social media to support strategic and operational decision making<br />
• Protect the physical and digital data assets of your organisation<br />
• Enhance your information and knowledge management capabilities<br />
• Identify and manage risks to your business assets<br />
• Apply scenarios and strategic foresight to issues of concern<br />
• Boost your efficiency and productivity in the workplace<br />
Quality Education<br />
Our seminars offer the perfect blend of theory and practice. Participants will be<br />
introduced to the concepts, models and technologies that inform today’s best<br />
practices, and will be given ample time to experiment with the tools and<br />
methodologies that are taught. In addition to the course slides, participants will<br />
receive a host of supplementary materials including cheat sheets, templates, software<br />
tools and additional reading materials to enable self-study.<br />
Professionally Relevant<br />
Our seminars guarantee measurable outcomes. The curricula have been designed<br />
around professional standards and best practices. We draw on the experience of the<br />
world’s foremost practitioners and use real-world case studies and simulations to help<br />
students internalise lessons learned and apply these skills in the workplace.<br />
Cost Effective<br />
We are committed to making instruction in intelligence and its related disciplines as<br />
affordable as possible. Our seminars have been competitively priced to help<br />
organisations and individuals of all backgrounds acquire and employ a 21st century<br />
skillset.<br />
Who Should Attend<br />
Our seminars are relevant to all professionals, regardless of their background or career<br />
ambitions.<br />
3
Open Source Intelligence<br />
This three-day seminar provides a detailed introduction to the discipline of Open<br />
Source Intelligence (OSINT). Participants will learn how to identify their intelligence<br />
needs and leverage a broad range of tools and sources to improve data collection,<br />
analysis and decision-making in their organisation.<br />
Course Outline<br />
Day 1: Requirements Planning<br />
Introducing OSINT • The varieties of OSINT (online, offline, etc.)<br />
• The benefits and limitations of OSINT<br />
• Strategic and operational dimensions of<br />
OSINT<br />
• Legal and ethical constraints<br />
Managing Requirements • Working with intelligence customers<br />
• Identifying collection requirements<br />
• The Key Intelligence Topics (KITs) process<br />
• Collection planning<br />
• Collection frameworks<br />
Day 2: Effective Web Exploitation<br />
Automating Intelligence<br />
Collection<br />
• Establishing a keyword index<br />
• Working with data aggregators<br />
• Generating data from the web<br />
• Generating data from social media<br />
• Working with alert services<br />
• Essential browser tools and extensions<br />
Searching the Web • Search strategies<br />
• Search operators<br />
• Recommended search engines<br />
• Searching the deep web<br />
• Building a customised search engine<br />
• Working with databases and directories<br />
• Maintaining an audit trail<br />
• Essential browser tools and extensions<br />
4
Day 3: Security and Data Management<br />
Safer Searching • Privacy, anonymity and proxy tools<br />
• Developing a sockpuppet<br />
• Working with Tor and the Dark Web<br />
Data Management and<br />
Exploitation<br />
• Validating your search results<br />
• Data processing and enrichment<br />
• Organising data for analysis<br />
• Working with data collation tables<br />
• The pre-analysis checklist<br />
Course Benefits<br />
On completion of this course, participants will have acquired the ability to:<br />
• Identify and manage their intelligence requirements<br />
• Improve the quality, accuracy and relevance of their search results<br />
• Automate the collection of data from the web and social media sources<br />
• Build a personal monitoring system to support strategy and decision making<br />
• Improve online privacy, anonymity and security<br />
• Organise data to identify knowledge gaps and support effective analysis<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up a Gmail and Twitter<br />
account if they do not already have one.<br />
5
Advanced OSINT<br />
This three-day seminar builds on the content of our introductory OSINT course. The<br />
objective here is to extend the OSINT professional’s skillset. In addition to enhancing<br />
their knowledge of valuable search tools and intelligence resources, we will provide<br />
guidance on the tools needed to conduct rigorous, legally compliant investigations<br />
of organisations, individuals and websites.<br />
Course Outline<br />
Day 1: Advanced OSINT<br />
Advanced Data Collection • Feed manipulation and processing tools<br />
• Task automation tools<br />
• Searching beyond Google<br />
• Web rippers and scrapers<br />
• XPath, regular expressions, DOM structures<br />
• Working with open data and APIs<br />
Open Source Geospatial<br />
Intelligence<br />
• Maps and mapping tools<br />
• Working with geolocational data<br />
• Leveraging data from social media<br />
Day 2: Web Investigations I<br />
Investigating Websites • Whois, DNS and IP tools<br />
• Identifying site ownership<br />
• Site mapping<br />
• Metadata exploitation<br />
• Unique identifiers on the web<br />
Investigating Organisations • Due diligence frameworks<br />
• Investigating ownership<br />
• Investigating subsidiaries<br />
• Identifying clients and business partners<br />
• Monitoring an organisations online footprint<br />
6
Day 3: Web Investigations II<br />
Investigating Individuals • Finding people online<br />
• Mapping an individual’s online footprint<br />
• Screen name investigations<br />
• Finding and validating email addresses<br />
• Email tracing and traffic analysis<br />
• Developing a digital profile<br />
• Legal and ethical considerations<br />
Working with Maltego • Set up and configuration<br />
• Working with entities and transforms<br />
• Running and editing a project<br />
• Supporting tools<br />
Course Benefits<br />
On completion of this course, participants will have acquired the ability to:<br />
• Apply a broader array of search tools and intelligence sources<br />
• Leverage geospatial data for strategic and operational intelligence purposes<br />
• Identify the ownership and provenance of websites and other resources<br />
• Conduct investigations on organisations and individuals of interest<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up a Gmail, Yahoo<br />
and Twitter account if they do not already have one. Additional software requirements<br />
will be sent prior to the start of the course.<br />
We strongly recommend that participants on our Advanced OSINT program first take<br />
our Open Source Intelligence seminar to ensure they understand the technical<br />
standards and operating principles that underpin our approach to data collection and<br />
analysis.<br />
7
Social Media Intelligence<br />
This three-day course will demonstrate how to generate strategic and operational<br />
intelligence from social media sources. Participants will be shown how to collect,<br />
process, and analyse social medial intelligence (SOCMINT) from a variety of networks<br />
and platforms. Further, they will be shown how to identify and monitor specific voices,<br />
issues and conversations. Finally, they will be shown how to conduct rigorous people<br />
investigations using a broad range of social media services.<br />
Course Outline<br />
Day 1: Mining Social Networks<br />
Establishing Your<br />
SOCMINT Toolkit<br />
• Configuring your browser<br />
• Extending your search capabilities<br />
• Developing keyword indices<br />
• Research tools and extensions<br />
• Content curation / management tools<br />
Automating SOCMINT<br />
Collection<br />
• Monitoring frameworks and approaches<br />
• Keyword / hashtag discovery and validation<br />
• Source discovery and validation<br />
• Recommended tools, apps and extensions<br />
• Establishing a monitoring dashboard<br />
Working with Social<br />
Networks<br />
• Working with Facebook, VK, LinkedIn, etc.<br />
• Finding and monitoring users and groups<br />
• Mining social networks for SOCMINT<br />
• Using third party tools and search services<br />
• Generating user stats and analytics<br />
Day 2: SOCMINT II<br />
Working with Twitter<br />
and Instagram<br />
• Finding, monitoring and geolocating users<br />
• Monitoring geolocated content<br />
• Generating user stats and analytics<br />
• Automating data collection<br />
• Search and content discovery tools<br />
• Third party dashboards and extensions<br />
8
Blogs and Discussions<br />
Boards<br />
• Mining blogging platforms for intelligence<br />
• Working with visual blogs (Pinterest, Tumblr)<br />
• Working with Reddit and discussion boards<br />
• Determining reach and influence<br />
Foreign Language SOCMINT • Mapping the SOCMINT universe<br />
• Mining foreign language sources<br />
• Working with translation tools and extensions<br />
Day 3: Online Investigations<br />
Getting Started • The investigative process<br />
• Working with target profiles and templates<br />
• Maintaining privacy and security online<br />
Investigating Individual<br />
Users<br />
• Finding people online<br />
• Mapping an individual’s online footprint<br />
• Screen name investigations<br />
• Unmasking hidden identities<br />
Course Benefits<br />
On completion of this course, participants will have acquired the ability to:<br />
• Monitor a broad range of social media sources, including non-Western ones<br />
• Identify and follow leading voices and opinion makers<br />
• Track the evolution of critical conversations and ideas<br />
• Apply free tools and standard office software to analyse the data collected<br />
• Use SOCMINT to support strategic planning, risk management and crisis<br />
response<br />
• Conduct online investigations in a legal and ethically appropriate manner<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up an anonymous<br />
Gmail, Twitter, Instagram, V-Kontakte and Facebook accounts if they do not already<br />
have them. Additional software requirements will be sent prior to the start of the<br />
course.<br />
9
Intelligence Analysis<br />
Our introductory course to intelligence analysis provides a solid introduction to the<br />
art and science of analytic reasoning. Participants will be given the foundational<br />
knowledge needed to establish and grow their analytic toolkit. Attention is given to<br />
descriptive and predictive modes of analysis, and the complimentary skills of trend<br />
identification, pattern detection, evidential reasoning, and ideation. The guidance<br />
provided by this course offers an essential prelude to our more advanced courses.<br />
Course Outline<br />
Day 1: Issue identification<br />
Introduction to<br />
Intelligence Analysis<br />
Analytic Thinking and<br />
Reasoning Skills<br />
• What is analysis?<br />
• The three modes of analytic reasoning<br />
• The challenge of analysis<br />
• The role of the analyst<br />
• The critical disciplines of analytic work<br />
• The current state-of-the-art<br />
• Critical, creative and conceptual thinking<br />
• Sensemaking and calibration<br />
• Problem identification and solving<br />
• Identifying trends, patterns and relationships<br />
• Evidential reasoning<br />
• Scoping and managing your uncertainty<br />
• Measuring and monitoring your thinking<br />
• Working with structured analytic techniques<br />
Ideation Skills • Brainstorming techniques<br />
• Idea enhancement techniques<br />
• Mind mapping<br />
• Concept mapping<br />
Day 2: Descriptive Analysis<br />
Descriptive Analytic<br />
Techniques<br />
• The 5W1H Model<br />
• Causal mapping<br />
• Causal factor chains<br />
• Causal loop diagrams<br />
• Actor / factor analysis<br />
• Working with timelines<br />
• Link / association charting<br />
10
Day 3: Predictive Analysis<br />
Predictive Analytic<br />
Techniques<br />
• Hypothesis generation<br />
• Trend / impact analysis<br />
• What if analysis<br />
• Impact / probability analysis<br />
• The futures wheel<br />
• Consequence trees<br />
Course Benefits<br />
On completion of this course, participants will have acquired the ability to:<br />
• Justify the importance of structured approaches to analytic thinking<br />
• Apply a range of critical and creative thinking skills<br />
• Develop causal narratives using descriptive analytic techniques<br />
• Anticipate future outcomes using predictive analytic techniques<br />
• Identify and explore cause-and-effect relationships<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up a Gmail account if<br />
they do not already have one.<br />
11
Advanced Intelligence Analysis<br />
Our Advanced Intelligence Analysis course looks to extend the toolkit provided in our<br />
introductory program. Participants will learn how to identify and explore multiple lines<br />
of analytic enquiry, most notably via the Analysis of Competing Hypothesis. Next,<br />
they will be shown how to identify practical solutions to the issues they are dealing<br />
with using prescriptive models such as roadmapping and cost-benefit analysis. The<br />
course ends by showing analysts how to critique the work of their peers and manage<br />
the cognitive biases common to all professionals.<br />
Course Outline<br />
Day 1: Predictive Reasoning<br />
Predictive Analytic<br />
Techniques<br />
• Multiple hypothesis generation<br />
• The Analysis of Competing Hypotheses<br />
• Developing indicators and watchlists<br />
Day 2: Prescriptive Analysis<br />
Prescriptive Analytic<br />
Techniques<br />
• If / then analysis<br />
• Opportunity analysis<br />
• Developing roadmaps and solution pathways<br />
• Feasibility analysis<br />
• Course of action analysis<br />
• Critical path analysis<br />
• Cost-benefit analysis<br />
Day 3: Challenge Analysis<br />
Challenge Analysis<br />
Techniques<br />
Cognitive Challenges to<br />
Analysis<br />
• Structured self-critique<br />
• Pre-Mortem analysis<br />
• Red teaming<br />
• Team A / Team B method<br />
• Devils advocacy<br />
• A typology of cognitive pathologies<br />
• Perception, memory, and reasoning<br />
limitations<br />
• Dealing with mindsets, blind spots and biases<br />
• Bias mitigation strategies<br />
12
Course Benefits<br />
On completion of this course, participants will have acquired the ability to:<br />
• Generate and evaluate multiple hypotheses using the ACH methodology<br />
• Identify and articulate viable policy prescriptions or problem solutions<br />
• Engage in multiple forms of challenge analysis, including Red Teaming and<br />
Devil’s Advocacy<br />
• Understand the risks posed by bias and other cognitive pathologies<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up a Gmail account if<br />
they do not already have one.<br />
13
Strategic Foresight<br />
Our course on Strategic Foresight introduces participants to a unique portfolio of<br />
analytic skills. Emphasis here is given to the many tools that support predictive<br />
reasoning. Participants will be shown how to scan their operating environment for<br />
indicators of change, and how to amplify and analyse these trends to help their<br />
organisation anticipate future challenges and opportunities.<br />
Course Outline<br />
Day 1: Strategic Anticipation and Issue Identification<br />
Strategic Anticipation • Sensing the future: how and why<br />
• The four levels of proactiveness<br />
• Outside in vs. inside out thinking<br />
• Understanding the dynamics of change<br />
Scanning the Future • Environmental Scanning<br />
• Trend analysis<br />
• Impact assessments<br />
Cultivating Foresight • Perspective taking<br />
• Mapping your uncertainty<br />
• Precision questioning and answering<br />
• The role of constructive confrontation<br />
Day 2: Working with Weak Signals<br />
Identifying Signals • Weak signal identification<br />
• Weak signal amplification<br />
Analysing Signals • Identifying critical uncertainties<br />
• Weak signal analysis<br />
• Establishing hypotheses<br />
• Identifying key risk indicators<br />
Monitoring Signals • Identifying intelligence sources<br />
• Defining a monitoring strategy<br />
• Maintaining a watchlist<br />
14
Day 3: Analytic Techniques for Strategic Foresight<br />
Analytic Tools and<br />
Techniques<br />
• Visioning<br />
• Backcasting<br />
• Shell’s seven questions<br />
• What if analysis<br />
• The futures wheel<br />
• Consequence trees<br />
• The Lidoli abacus<br />
• Impact / probability analysis<br />
Course Benefits<br />
On completion of this course, participants will have acquired the ability to:<br />
• Establish strategic foresight as an institutional / operational capability<br />
• Identify, analyse and monitor weak signals and other change indicators<br />
• Apply a range of foresight techniques to explore risk / crisis scenarios<br />
• Think critically and creatively about future challenges to one’s organisation<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up a Gmail account if<br />
they do not already have one.<br />
15
Scenario Planning<br />
Our Scenario Planning program offers a structured approach to exploring alternate<br />
futures and their potential impact on one’s organisation. Participants will be given<br />
detailed guidance on how to identify and analyse those trends that are likely to shape<br />
their market or operating environment. They are then shown how to use these trends<br />
to construct plausible narratives of potential futures, and develop the necessary<br />
contingencies, strategies or action plans to meet them with confidence.<br />
Course Outline<br />
Day 1: Identifying Strategic Trends<br />
Introduction to Scenario<br />
Planning<br />
Scanning for Strategic<br />
Trends<br />
• A brief history of scenario planning<br />
• Benefits and limitations<br />
• Scenario thinking vs. scenario planning<br />
• The varieties of scenarios<br />
• Identifying and prioritising strategic trends<br />
• Mapping drivers and potential impacts<br />
• Causal loop mapping<br />
• Identifying critical uncertainties<br />
Day 2: Developing Scenarios<br />
Developing Scenarios • The three futures calibration model<br />
• Plotting timelines<br />
• Selecting the key axes of uncertainty<br />
• Working with consequence radars<br />
• Defining stakeholder actions / reactions<br />
• Drafting scenario narratives<br />
Reporting Scenarios • The elements of effective storytelling<br />
• Structuring your scenario reports<br />
• Alternative scenario communication strategies<br />
Day 3: From Scenarios to Strategies<br />
Translating Scenarios into<br />
Strategies<br />
• From analytic insights to strategic objectives<br />
• Identifying and analysing strategic options<br />
• Identifying strategic opportunities<br />
• Evaluating strategic fit<br />
16
• Developing contingencies<br />
• Action planning<br />
• Means-End Analysis<br />
• The Plan–Do–Check–Act model<br />
• Resource planning<br />
• Implementation<br />
Course Benefits<br />
On completion of this course, participants will have acquired the ability to:<br />
• Identify, analyse and monitor the strategic trends that are likely to impact their<br />
organisation or operating environment<br />
• Imagine and explore multiple futures and their consequences<br />
• Select a desired future and the steps needed to realise it<br />
• Define contingency and action plans in preparation for an uncertain future<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up a Gmail account if<br />
they do not already have one.<br />
17
Risk Management<br />
This four-day program provides a comprehensive introduction to the discipline of risk<br />
management. Participants will be shown how to identify and evaluate the risks to their<br />
organisation. Thereafter, they will be given the tools they need to establish the<br />
necessary risk controls and mitigation strategies. The program ends with detailed<br />
guidance on effective risk communication to one’s stakeholders.<br />
Course Outline<br />
Day 1: Risk Identification<br />
Understanding Risk • A brief history of risk<br />
• Risk theory and definitions<br />
• Understanding the many forms of risks<br />
Risk Identification • Mapping the risk landscape<br />
• Identifying risk sources and motivations<br />
• Identifying key assets<br />
• Identifying vulnerabilities and threats<br />
• Generating risk intelligence<br />
Day 2: Risk Analysis<br />
Analytic Tools for Risk<br />
Analysis<br />
• What if analysis<br />
• Fault trees<br />
• Attack trees<br />
• Decision trees<br />
• Impact analysis<br />
• Decision matrices<br />
Risk Evaluation • Developing and maintaining a risk taxonomy<br />
• Analysing impact, probability, severity and<br />
urgency<br />
• Qualitative and quantitative risk analysis<br />
• Working with risk matrices<br />
• Developing risk indicators<br />
18
Day 3: Risk Management<br />
Risk Management • Contemporary management theories<br />
• Models, frameworks and approaches<br />
• The risk management toolkit<br />
Operationalising Risk<br />
Management<br />
• Risk prioritisation<br />
• Defining and implementing risk controls<br />
• Developing a risk management strategy<br />
• Developing and maintaining a risk register<br />
• Risk monitoring: methods and approaches<br />
• Risk reviews and audits<br />
Risk Intelligent Organisation • Characteristics of a risk intelligent organisation<br />
• Building a risk-tolerant culture<br />
• Learning to take risks<br />
• The role of the risk officer<br />
Day 4: Risk Communication<br />
Introducing Risk<br />
Communication<br />
Developing a Risk<br />
Communication Plan<br />
• The many forms of risk communication<br />
• Communication models and approaches<br />
• Establishing and validating the risk<br />
communication process<br />
• Identifying stakeholders and their<br />
requirements<br />
• Structuring your message for effect<br />
• Selecting your communication channel<br />
• Communicating uncertainty<br />
• Managing the response<br />
• Best practices in risk reporting<br />
19
Course Benefits<br />
On completion of this course, participants will have acquired knowledge of:<br />
• Best practices in risk identification, analysis, management and control<br />
• The application of risk management models to identify internal and external<br />
challenges to an organisation’s assets<br />
• Frameworks for improving decision making and the management of<br />
uncertainty<br />
• Guidance on operationalising the techniques taught in the workplace<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up a Gmail<br />
account if they do not already have one.<br />
20
Intelligence Reporting<br />
This course provides a detailed introduction to the development and delivery of<br />
intelligence products, both written and oral. Participants will be given a general<br />
introduction to intelligence reporting and given guidance on drafting copy that is<br />
crisp and clear. From there, they will be shown how to structure and develop long and<br />
short-form intelligence products. The course goes on to provide guidance on the<br />
delivery of effective oral briefings and presentations.<br />
Course Outline<br />
Day 1: Writing Skills<br />
General Reporting Principles • Knowing your audience<br />
• Constructing and testing your arguments<br />
• Communicating risk and warning<br />
• Communicating analytic confidence<br />
Writing Skills • Effective writing skills<br />
• Writing to the Minto Pyramid<br />
• Referencing your work<br />
• Self-editing and proofing<br />
• Peer-editing and evaluation<br />
Day 2: Developing Analytic Products<br />
Analytic Products • The varieties of analytic product<br />
• Developing and working with templates<br />
• Drafting alerts<br />
• Drafting briefs and situation assessments<br />
• Drafting estimates, reports and forecasts<br />
• Generating customer feedback<br />
Making Recommendations • Developing options<br />
• Generating SMART recommendations<br />
21
Day 3: Briefings and Presentations<br />
Presentations and Oral<br />
Briefings<br />
• Developing presentations<br />
• Multimedia intelligence products<br />
• Preparing for a briefing<br />
• Effective presentation skills<br />
• Handling questions and objections<br />
• Managing your audience<br />
Course Benefits<br />
On completion of this course, participants will have acquired the ability to:<br />
• Construct arguments that are logical and supported by evidence<br />
• Employ simple rules to improve the quality and clarity of their writing<br />
• Draft long and short form products that are support customer needs<br />
• Develop and deliver oral briefings that address the audience’s descriptive,<br />
predictive and prescriptive information needs<br />
• Generate constructive feedback from one’s customers and peers<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up a Gmail account if<br />
they do not already have one.<br />
22
Cybersecurity<br />
This three-day program provides a detailed introduction to the discipline of<br />
cybersecurity. Participants will be shown how to mitigate a range of cyber threats, and<br />
how to improve their privacy and security online. Further, they will apply the tools and<br />
techniques common to hackers to measure their own vulnerability and that of their<br />
organisation. Guidance is also given on how to manage the physical threats to an<br />
organisation’s information assets.<br />
Course Outline<br />
Day 1: Key Risks and Vulnerabilities<br />
The Internet • The Internet: What it is and how it works<br />
• Key protocols and standards<br />
• Critical infrastructures and their vulnerabilities<br />
• Internet security: thinking in systems<br />
Cyber Risks • Malware<br />
• Phishing<br />
• Cyber espionage<br />
• Cyber extortion<br />
• Denial of service attacks<br />
• Wireless and mobile vulnerabilities<br />
• Minimising Internet surveillance<br />
• Mitigating cyber risks<br />
Day 2: The Hacker Threat<br />
Hacking and Hackers • How hackers work<br />
• The hacker’s mindset<br />
• The hacker’s toolkit<br />
• The hacker’s methodology<br />
• Social engineering<br />
• Reducing your exposure to hackers<br />
Personal Cyber Security • Privacy and security online<br />
• Working with proxy tools<br />
• Effective password security<br />
• Reducing your digital footprint<br />
• The risks of oversharing<br />
23
Day 3: Information Risk Management<br />
Information Risk<br />
Management<br />
• The principles of risk management<br />
• Asset identification and evaluation<br />
• Identifying information vulnerabilities<br />
• Implementing information risk controls<br />
• Business continuity planning<br />
Physical Security • Identifying vulnerabilities<br />
• Testing your physical security<br />
• The “insider threat”<br />
• Mitigating non-digital risks<br />
Course Benefits<br />
On completion of this course, participants will have acquired the ability to:<br />
• Understand the Internet, how it works and its vulnerabilities<br />
• Mitigate the most prevalent cyber risks using essential best practices<br />
• Apply the tools used by hackers to build a security / target profile<br />
• Identify, evaluate and mitigate digital and physical risks to one’s information<br />
assets<br />
• Develop a business continuity plan in the event of a security incident<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up an anonymous<br />
Gmail, Twitter and Facebook account if they do not already have one. Additional<br />
software requirements will be sent prior to the start of the course.<br />
24
Competitive Intelligence<br />
This three-day course provides a general introduction to the practice of competitive<br />
intelligence (CI). Participants will receive training in a broad range of research and<br />
analytic skills. These will help them to identify and manage their organisation’s<br />
information needs; improve their primary and secondary research skills; use different<br />
media monitoring tools; and employ a broad range of analytic techniques to profile<br />
competitors, evaluate markets, anticipate risks, and improve decision-making.<br />
Course Outline<br />
Day 1: Requirements Planning<br />
The Practice of CI • Understanding the value of CI<br />
• The competitive intelligence cycle<br />
• What CI can and can’t do<br />
• Legal and ethical constraints of CI<br />
Managing Requirements • Working with intelligence customers<br />
• Identifying collection requirements<br />
• The Key Intelligence Topics (KITs) process<br />
• Collection planning<br />
• Collection frameworks<br />
Day 2: Data Collection<br />
Effective Internet Exploitation • Working with keywords<br />
• Search strategies<br />
• Search engines and operators<br />
• Automating data collection<br />
• Alert services<br />
• Working with the Deep Web<br />
• Working with Social Media<br />
• Building a customized search engine<br />
• Essential browser tools and extensions<br />
25
Investigating Competitors • Company profiling<br />
• Identifying management and ownership<br />
• Working with official records<br />
• Working with satellite / imagery sources<br />
• Sources of financial data<br />
Day 3: Market and Competitor Analysis<br />
Analysing Market and<br />
Competitor Intelligence<br />
• Analytical techniques to evaluate your<br />
business, competitors and operating<br />
environment<br />
• Cognitive biases and business blindspots<br />
• Learning from feedback and “failure”<br />
Establishing a CI Unit • Guidelines for establishing and running a<br />
CI practice in your organisation<br />
Course Benefits<br />
On completion of this course, participants will have acquired the ability to:<br />
• Identify and manage their intelligence requirements<br />
• Improve the quality, accuracy and relevance of their search results<br />
• Automate the collection of data from the web and social media<br />
• Employ simple frameworks to analyse data on competitors and markets<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up a Gmail and Twitter<br />
account if they do not already have one.<br />
26
Intelligence for Sales Professionals<br />
Whether you are a young entrepreneur or a veteran sales professional, the ability to<br />
find and win new business is critical to the success of your organisation. This two-day<br />
seminar provides a practical, intelligence-led approach to lead generation, key<br />
account management and business growth. Participants will be taught how to identify<br />
and monitor new leads, gather data using free online tools, generate lead maps, and<br />
embed simple intelligence workflows into their key account processes.<br />
Course Outline<br />
Day 1: Scoping and Preparation<br />
Planning Your Sales Research • The intelligence process and your sales<br />
strategy<br />
• Identifying your key intelligence requirements<br />
• Developing your research plan<br />
• Identifying relevant sources, data and trends<br />
Intelligence for Key Account<br />
Management<br />
• Scoping your market(s)<br />
• Identifying and monitoring customer’s needs<br />
• Generating industry and regulatory insights<br />
• Monitoring competitor strategies and tactics<br />
• Establishing your key accounts / market<br />
segments<br />
• Building your target lists<br />
• Defining your value proposition<br />
• Developing your sales strategy and objectives<br />
• Establishing an intelligence-led sales process<br />
• Measurement, reporting and analytics<br />
Day 2: Generating Sales Intelligence<br />
Generating Actionable<br />
Sales Intelligence<br />
• The fundamentals of Internet research<br />
• Identifying and validating leads and potentials<br />
• Monitoring the web and social media<br />
• Monitoring government sources for public<br />
tenders<br />
27
• Aggregating contact data with site scrapers<br />
• Generating sales maps with Excel, Fusion<br />
Tables and Google Maps<br />
• Establishing an open-source CRM in the cloud<br />
Course Benefits<br />
On completion of this course, participants will have acquired the ability to:<br />
• Identify and monitor new leads and business opportunities<br />
• Gather sales intelligence using online tools and sources<br />
• Embed simple intelligence workflows into their key account processes<br />
• Generate lead maps so as to better coordinate client visits<br />
• Establish a free, open source CRM solution in the cloud<br />
• Use web-based tools to enhance productivity and effectiveness<br />
Course Requirements<br />
Participants are required to bring a laptop with them and to set up a Gmail account if<br />
they do not already have one.<br />
28
<strong>2017</strong> Course Dates and Fees<br />
Brussels<br />
Seminar Dates Fee<br />
Open Source Intelligence<br />
20 - 22 March<br />
9 - 11 October<br />
Corporate: EUR 1,000<br />
Non-Profit: EUR 800<br />
Student: EUR 500<br />
Advanced OSINT<br />
23 - 25 March<br />
12 - 14 October<br />
Corporate: EUR 1,000<br />
Non-Profit: EUR 800<br />
Student: EUR 500<br />
Social Media Intelligence<br />
27 - 29 March<br />
16 - 18 October<br />
Corporate: EUR 1,000<br />
Non-Profit: EUR 800<br />
Student: EUR 500<br />
Intelligence Analysis 30 March - 1 April Corporate: EUR 1,000<br />
Non-Profit: EUR 800<br />
Student: EUR 500<br />
Strategic Foresight 3 – 5 April Corporate: EUR 1,000<br />
Non-Profit: EUR 800<br />
Student: EUR 500<br />
Advanced Intelligence Analysis 19 - 21 October Corporate: EUR 1,000<br />
Non-Profit: EUR 800<br />
Student: EUR 500<br />
Intelligence Reporting 23 – 25 October Corporate: EUR 1,000<br />
Non-Profit: EUR 800<br />
Student: EUR 500<br />
Scenario Planning 26 – 28 October Corporate: EUR 1,000<br />
Non-Profit: EUR 800<br />
Student: EUR 500<br />
29
Zurich<br />
Seminar Dates Fees<br />
Competitive Intelligence 29 - 31 May CHF 1,000<br />
Intelligence for Sales Professionals 1 - 2 June CHF 800<br />
Open Source Intelligence 4 - 6 December CHF 1,000<br />
London<br />
Seminar Dates Fees<br />
Open Source Intelligence 26 - 28 June GBP 800<br />
Advanced OSINT 29 June - 1 July GBP 800<br />
Social Media Intelligence 3 - 5 July GBP 800<br />
New York<br />
Seminar Dates Fees<br />
Open Source Intelligence 1 – 3 May US$ 1,000<br />
Social Media Intelligence 4 – 6 May US$ 1,000<br />
30
Hong Kong<br />
Seminar Dates Fee<br />
Open Source Intelligence 18 - 20 May HKD 8,500<br />
Advanced OSINT 22 - 24 May HKD 8,500<br />
Social Media Intelligence 25 - 27 May HKD 8,500<br />
Competitive Intelligence 6 – 8 November HKD 8,500<br />
Intelligence for Sales Professionals 9 – 10 November HKD 8,500<br />
Singapore<br />
Seminar Dates Fees<br />
Open Source Intelligence 13 - 15 March SGD 1,500<br />
Advanced OSINT 16 - 18 March SGD 1,500<br />
Intelligence Analysis 3 - 5 April SGD 1,500<br />
Advanced Intelligence Analysis 6 - 8 April SGD 1,500<br />
Competitive Intelligence 10 - 12 April SGD 1,500<br />
Intelligence for Sales Professionals 13 – 14 April SGD 1,000<br />
Social Media Intelligence 9 – 11 October SGD 1,500<br />
Scenario Planning 12 – 14 October SGD 1,500<br />
Strategic Foresight 16 – 18 October SGD 1,500<br />
31
Phnom Penh*<br />
Seminar<br />
Open Source Intelligence<br />
Intelligence Analysis<br />
Social Media Intelligence<br />
Advanced OSINT<br />
Advanced Intelligence Analysis<br />
Competitive Intelligence<br />
Intelligence for Sales Professionals<br />
Risk Management<br />
Scenario Planning<br />
Strategic Foresight<br />
Cybersecurity<br />
Dates<br />
2 - 4 March<br />
6 - 8 March<br />
9 - 11 March<br />
5 - 7 June<br />
8 - 10 June<br />
3 - 5 July<br />
6 - 7 July<br />
10 - 13 July<br />
14 - 16 August<br />
17 – 19 August<br />
21 – 23 August<br />
*All seminars in Cambodia will be administered by our partner Plus 7 International<br />
(www.plus7international.com). Please contact them for registration information.<br />
Notes<br />
Seminars outside of Switzerland are not charged VAT. All course fees are<br />
inclusive of three months of post-course support for participants.<br />
32
Terms and Conditions<br />
Payment<br />
Unless otherwise agreed, payment should be made in advanced of the course to an<br />
account specified by the organisers. Late payments are liable to a 10 per cent charge.<br />
Group Discounts<br />
Organisations wishing to send two or more participants are eligible for a 10 per cent<br />
discount on the course fee. Please contact us for more information.<br />
Course Confirmation Policy<br />
All courses will be confirmed one month prior to the start date. Participants are<br />
advised not to make any travel arrangements until they receive notification that the<br />
course will proceed. We recommend that any arrangements made before this time<br />
be fully refundable.<br />
Cancellation Policy<br />
Participants cancelling within one week of a seminar’s start date will be charged 80<br />
per cent of the course fee. Participants cancelling more than one week before the<br />
start date will receive a refund minus an administrative fee of EUR 100.<br />
If you cannot attend, you are welcomed to have someone attend in your place and<br />
so avoid losing your registration fee.<br />
Changes to the Course Agenda<br />
i-intelligence reserves the right to cancel the course if there is an insufficient number<br />
of registrations. You will be given adequate notice if this is the case.<br />
33
Course Logistics<br />
Number of Participants<br />
The maximum number of participants per seminar is 15. This ensures a greater level<br />
of engagement, collaboration and guidance from the instructor.<br />
Technical Requirements<br />
Participants are required to bring a laptop with them and should have administrative<br />
rights access to this device. Detailed software requirements for each course will be<br />
sent prior to the start of every seminar.<br />
Course Hours<br />
The seminars will run from 9:00 am to 5:00 pm. This includes a one-hour break for<br />
lunch and two twenty-minute coffee breaks. Lunch, coffee and snacks will be provided<br />
to participants.<br />
Location<br />
All seminars will take place in the central business district of the respective city with<br />
convenient access to public transportation. The exact location of each seminar will be<br />
communicated to participants prior to the course commencing.<br />
Language of Instruction<br />
The language of instruction, and all course materials, will be in English.<br />
34
Organizer and Instructors<br />
About i-intelligence<br />
i-intelligence is a commercial intelligence consultancy based in Zurich, Switzerland.<br />
Established in 2010, the company provides research, training and advisory services to<br />
public and private sector organisations around the globe. Our course portfolio covers<br />
the entire intelligence cycle as well as related disciplines such as information and<br />
knowledge management, futures and foresight and risk and strategy analysis. The<br />
company’s clients include EU and UN institutions, international organisations, NATO,<br />
ministries of defence and foreign affairs, Fortune 500 companies and enterprising<br />
SMEs.<br />
About the Instructors<br />
The courses will be led by Chris Pallaris, Aleksandra Bielska or Vytenis Benetis.<br />
Chris Pallaris is Director and Principal Consultant of i-intelligence. He has over 15 years<br />
of experience as an analyst and 10 as a teacher. In addition to client work, he is an<br />
Associate Lecturer at Mercyhurst University's Institute for Intelligence Studies. He also<br />
teaches courses in the domain of strategic intelligence and knowledge management<br />
at the ZHAW's School of Management and Law, and ETH Zurich.<br />
Vytenis Benetis is the Director of i-intelligence in Asia. Vytenis has worked as an<br />
intelligence analyst for almost a decade. His professional experience covers a wide<br />
range of missions and organizations including the Lithuanian Ministry of Defence,<br />
NATO, and the European Union on both the operational and strategic level. Vytenis<br />
has delivered training to public and private sector organisations around the world.<br />
Aleksandra Bielska is an educator, analyst and consultant specialising in the collection,<br />
analysis and management of intelligence. As an educator, she has taught intelligence<br />
theory and practice to public and private sector organisations, including at NATO’s<br />
Centre of Excellence in the Defence Against Terrorism in Ankara, Turkey, and at the<br />
NATO School in Oberammergau, Germany. Her experience covers the entire gamut<br />
of intelligence disciplines including data collection, information and knowledge<br />
management, and strategic foresight.<br />
35
Contact Us<br />
i-intelligence | Europe<br />
Chris Pallaris<br />
Tel: +41 (0) 43 243 3849<br />
Email: info@i-intelligence.eu<br />
i-intelligence | Asia<br />
Vytenis Benetis<br />
Tel: +7 747 419 4165<br />
Email: v.benetis@i-intelligence.eu<br />
36