Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Industrial Espionage - Humint - Sigint - Opsint - Osint

    Posted By: ELK1nG
    Industrial Espionage - Humint - Sigint - Opsint - Osint

    Industrial Espionage - Humint - Sigint - Opsint - Osint
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.09 GB | Duration: 2h 18m

    Company and Individual knowledge protection

    What you'll learn
    Understand the human and psychological approach used to obtain information
    Understand the different phases of a successful industrial espionage operation
    Understand who can be the object of an industrial espionage operation and why
    Identify countermeasures to protect company personnel
    Understand MICE concept
    Understand what industrial espionage is, the origin of the threat and attackers' modus operandi
    Identify the risks specific to your organization according to its strategic interests and quantify them
    Adopt good practices to protect your organisation and your data against industrial espionage
    Learn how to train employees
    Discover HUMINT - SIGINT - OPSINT - OSINT
    Requirements
    None
    Description
    This second module is intended for everyone, employees, managers, security managers, DPOs or simply anyone who wants to understand in detail how an industrial espionage operation works and better understand the risks associated with industrial espionage and good practices to protect their organization, employees and data.

    This training, based on a wide experience in the public (military, foreign affairs) and private (banking, cybersecurity) sectors, gives a high level overview of the risks mentioned illustrated by concrete examples, the definition and examples of risks and threats, the different sensors (including psychological aspects and prejudices) used to collect sensitive information (legal and illegal) as well as the way an attacker thinks when defining his plan to access confidential information about a targeted company.

    It takes up one by one the different sensors studied in the first part of the training module with the help of videos, notably from the film "Les Patriotes" by Eric Rochant for a more interactive training. Each step of the psychological and human manipulation, each technical and operational method of information retrieval are precisely detailed.

    The second part takes up these different means of acquisition, this time associating the methods and tools to detect these operations and to protect oneself against them.

    This module can be used as a training and awareness supplement within the framework of a company program.

    HUMINT - SIGINT

    Who this course is for
    Employees
    Security/safety managers
    CEO
    HR