IPS Academy
Tailored training courses and workshops for Intelligence, Security and Defence
IPS Academy
IPS trainings are tailored for crime and cyber-crime investigators, special forces, intelligence analysts, covert ops specialists, etc.
They implements specific methodologies to enhance students’ hard skills by blending theoretical concepts with effective hands-on using leading-edge systems used on the field.
The high practicality of the lessons allow the students to quickly learn the latest operational methods for Intelligence.
IPS offers the following trainings provided by teachers with long time technical and investigative proven experience:
1. Social Media Intelligence
A deep introduction to OSINT to learn how to search, process and report on Open Source Intelligence. In addition to providing a strong theoretical understanding of intelligence concepts and methodologies, the course incorporates practical applications of these principles within an open source context by using online tool and platforms.
2. Communication Intelligence
Complete courses to explore the collection, monitoring and analysis on multiple sources in the ETSI standard Lawful Interception and unconventional scenarios.
3. Electronic Surveillance
Practical courses on simulated real operations to provide the needed skills and capabilities to operate on the field.
4. Cyber Security
IPS also offers training courses in the field of Cyber Security, delivered by certified and experienced personnel.
Related features
Social Media and Open Source Intelligence
This course aims to provide students with a deep introduction to SOCMINT, OSINT in order to maximize the way they search, process and report on Social Media Intelligence. In addition to providing a strong theoretical understanding of intelligence concepts and methodologies, the course incorporates the practical application of these principles within an open source context by using online tools and proprietary platform. The topics covered and the learning outcomes are:
Target Profiling
Public Sentiment
Social Engagement
Social Engineering
Link Analysis
Trend Discovery
Social Media Campaign
Offensive OSINT
Electronic Surveillance
The training focuses on actual procedures and best practices to adopt in tactical covert-ops in hostile environments using a range of surveillance equipment (GPS trackers, audio/video surveillance recorders) and how to deliver the gathered data to a Command and Control Centre for situation awareness and quick decision making. The training has a large part of practical courses on simulated real operations to provide the needed skills and capabilities to operate on the field. The topics covered and the learning outcomes are:
GPS Tracking
Audio Surveillance
Video Surveillance
Long Range cameras and analysis
Vehicle Opening and Installation
Van Set-up and Installation
IMSI Catcher, Direction Finder and Geo-Location
Smart Jamming
Passive Acoustic Microphones
Concealment and Covert operations methodologies
Communication Intelligence
Complete course to explore the collection, monitoring and analysis on multiple sources in the ETSI standard Lawful Interception and unconventional scenarios. Aim of the training is to provide awareness on different analytics tools in order to extract valuable intelligence and evidences through application of consolidated workflow: Voice Calls interception – CDR (Call Detailed Records) and IPDR (IP Detailed Records) gathering and analysis, Link Analysis tools, Case Management, Metadata extraction and correlation.
The topics covered and the learning outcomes are:
Lawful Interception methodologies
Centralized Monitoring Centre
New Telecom technologies (VoLTE, 5G)
Latest standards and interfaces
Mediation
Voice Interception
Voice Biometrics
Target Positioning and Tracking
Relationship Analysis
Internet Interception
IP and Metadata Analytics
Cyber Security
Cyber Security: IPS offers training courses in the field of Cyber Security, delivered by certified and experienced personnel. The topics covered and the learning outcomes are:
Cyber Security
ParcoursOSINT for CyberINFOSECPenTester
ParcoursReverse
Engineering code
AnalysisMalware
AnalysisSecurity
Architect
ExpertLAB
ManagementLawful
Interception ops