Name | Summary | Price | Buy |
---|---|---|---|
ASSESSING SOCIAL MEDIA VULNERABILITIES (Online) | While social media platforms provide tremendous benefit for individuals as well as organizations in | Rp 2.000.000 | |
Certified Counter-Terrorism Practitioner (CCTP) | At the Certified Counter Terrorism Board, we have developed and maintained a voluntary and comprehensive certification scheme that is recognized as the standard of excellence for competent counter terrorism professionals. It has been designed by practitioners, for practitioners. This is critical, as it is only through understanding the threat of terrorism globally, having the ability to identify the various threats and modus operandi of the terrorist, and possessing the ability to assess the risk and to implement the necessary processes and technological protective measures, that we have the ability to prepare and respond to terrorist acts efficiently and effectively. | Rp 27.500.000 | |
Certified Intelligence Analyst (CITA) | Rp 27.500.000 | | |
Certified Physical Security Consultant (CPSC) | The Counter Terrorism Certification Board has established and maintains a voluntary and comprehensive certification scheme — Certified Physical Security Consultant (CPSC). It grants the CPSC certification and maintains it as the recognized standard of excellence for competent security and law enforcement professionals. | Rp 35.000.000 | |
Counter Drone Course | The use of drones have progressed quickly for all types of activities such as agricultural assessments, | Rp 16.000.000 | |
COUNTER ESPIONAGE FOR BUSINESS TRAVELLERS (Online) | In an increasingly competitive business environment, companies are at risk of having their sensitive proprietary information and technology stolen by direct competitors as well as nation states. With the rise in global travel across several countries and continents, business travelers have become a frequent and accessible target of corporate espionage. In this interactive online course, participants will discover the prevalence of corporate espionage, learn strategies to protect sensitive proprietary information and technology and develop greater situational awareness of such threats when they travel. | Rp 2.000.000 | |
Developing Business Case for Security Projects | You have completed your security risk assessment. Now it is time to move on to close the gaps | Rp 6.000.000 | |
Monitoring Extremist Groups on Telegram (Online) | In recent years Telegram has become the platform of choice for a wide range of extremist and | Rp 2.000.000 | |
Online Investigation (Online) | Students will learn the techniques and tools used in OSINT investigations around an individual, group | Rp 2.000.000 | |
Open Source Intelligence (OSINT) | In this 3-day course and hands-on workshop, students will learn the tools and techniques used in the field of Open Source Intelligence. With special emphasis on social media monitoring, research and analysis, this training is designed to enable security professionals to better discover, evaluate and understand threats, and to conduct efficient online investigations on individuals and organizations. Upon completion of the training, participants will gain better understanding of their role in the Intelligence Cycle; become familiar with a wide range of social media platforms and the tools and techniques that are needed in order to get the most out of these sources; be able to build a real-time threat-detection system and implement it on any computer; be able to conduct online investigations to uncover a target’s background and network of contacts, while staying safe and not compromising their online identity; understand and use advanced analytic techniques. | Rp 20.000.000 | |
Security Management at Events (Online) | Concerts, exhibitions and conferences are among several events in Singapore that require a competent team of security officers to ensure that the security operations at the event runs smoothly and successfully. Besides managing the security operations at the events, the security supervisor must also liaise with other stakeholders of the event. Security supervisors will need to know key function areas of security operations at events. They will need to be able to identify and mitigate security and safety risks at events. They will need to be equipped with strategies to manage security operations at events. Security supervisors must also be able to manage security and safety incidents at the event. | Rp 2.000.000 | |
Security Management for Critical National Infrastructure (New) | Covering essential areas in security management at critical national infrastructure environment, and | Rp 9.000.000 | |
Security Operations at Events (Online) | Concerts, exhibitions and conferences are among several events in Singapore that require a | Rp 2.000.000 | |
Security Risk Assessment | This course incorporates classroom sessions followed with class presentation. After lectures in the | Rp 9.000.000 | |
SOCIAL ENGINEERING MITIGATION (Online) | In an increasingly competitive business environment, companies are at risk of having their sensitive proprietary information and technology stolen by direct competitors as well as national states. With the rise in global travel across several countries and continents, business travelers have become a frequent and accessible target of corporate espionage. In this interactive online course, participants will discover the prevalence of corporate espionage, learn strategies to protect sensitive proprietary information and technology and develop greater situational awareness of such threats when they travel. | Rp 2.000.000 | |
Threats Vulnerabilities Risk Assessment (TVRA) | This course incorporates classroom sessions with a Hands-On approach. After lectures in the | Rp 9.000.000 | |
Twitter for Security: Real-time Information Discovery and Threat Detection (Online) | Student will learn the techniques & Tools used to monitor twitter effectively & deeply, with special emphasis on emerging threats and breaking new. | Rp 2.000.000 | |
© 2025 · www.heilandsolutions.com