PHYSICAL SURVEILLANCE
COURSE NO. 2019120
This 5-day course is designed for operators, officers, and government officials operating from forward-deployed and OCONUS locations and using unsecured networks and local infrastructure. This intense training course will require you to become proficient with the skills listed below. Bring your own devices as this is a hands-on course that allows you to walk away with a full suite of hardened and secured equipment and best practices for maintaining a secure posture. In addition to classroom instruction and a series of practical exercises, the student will be provided with reference materials, access to online threat vulnerability services, and 3rd party services for encrypted commercial communications.
Securing the Laptop and Data Encryption
-
Updating and protecting the BIOS
-
Wiping the hard drive and installing a clean OS
-
Managing local machine credentials
-
Installing and managing a local firewall
-
Installing and maintaining protection against malicious software
-
Installing and configuring a secure browser
-
Installing a virtual machine and self-monitoring tools
-
Validating a secure laptop
-
Drive encryption
-
File-level security
-
Secure data validation
Minimizing / Reducing Digital Signature
-
OSINT and data mining tools
-
Minimize vulnerabilities associated with cloud services
-
Vulnerabilities of Google, icloud, Office365 and other services
-
Securing social media
-
Locking down personal and family social media
-
Digital and RF situational awareness
-
Fundamentals of software defined radios
Secure Networking and Communications
-
Options and equipment selection for OCONUS operations
-
Network fundamentals
-
Selecting, Installing, and using a VPN
-
Monitoring system network connectivity for malicious activity
-
Identifying and countering unauthorized intrusion
-
Configuring a secure browser
-
Encrypting email
-
Using Skype, Facetime and VOIP phones over unsecured networks
-
Set up and use of a cloud-based VM
-
The merits of a Jump Box
-
Securing the mobile device
-
Multi-mode authentication
-
Ten critical actions before taking a personal mobile device overseas
Detection and Characterization of a Digital Attack Remediation of Exploited Systems
-
OSINT and data mining tools
-
Minimize vulnerabilities associated with cloud services
-
Vulnerabilities of Google, icloud, Office365 and other services
-
Securing social media
-
Locking down personal and family social media
-
Digital and RF situational awareness
-
Fundamentals of software defined radios