Seminar Techniques, Electronic Countermeasures and Surveillance
zoom_out_map
chevron_left chevron_right

Seminar Techniques, Electronic Countermeasures and Surveillance

If you want to obtain the knowledge necessary to make your own sweeps radioelectricos to locate cameras, microphones and GPS locators, you must perform this seminar.

Security policy
Page Encrypted SSL- Secure Payment
Delivery Policy
Free shipping to all of Europe. Delivery in 24 hours
Return policy
14 days to return
2 years warranty
Official dealer - 2 years warranty

ATTENTION: This product is not sold online. To make the purchase must be addressed to our physical stores or request a quote clicking HERE

 

SEMINAR FOR MONITORING TECHNIQUES IN ELECTRONIC COUNTERMEASURES

 

Currently, the security sector presents several challenges. Security threats are constantly evolving and the sector must respond trained properly to cope with new risks. Countermeasures and surveillance require a revision and constant update to the few that are advancing the technologies. Hence the importance of this course, the only one of its kind in Spain with the level of update and information more complete.

 

RECIPIENTS

Security departments, Private Detectives, Security Directors, members of the Armed Forces and State Security Forces, staff of embassies. Professionals that require a degree college in addition to expanding the knowledge already acquired.

SPECIFIC REQUIREMENTS: do Not exist.

 

1.PRESENTATION AND OBJECTIVE

The objective of the Seminar is to provide the student with theoretical and practical knowledge of surveillance electronic countermeasures (Technical Surveillance Counter Measures) in order to locate and/or neutralize devices or systems of espionage, providing security in different work environments or private in which they can develop their activity.

At the end of this Seminar, the student will have gained the basic ability to distinguish all of the threats and vulnerabilities existing in the different environments, which with practice will develop the characteristics enough to offer his services as a specialist TSCM at the best Corporations, Institutions or Private Companies with the highest quality, in vogue in these times of world crisis by the lack of specialized professionals in the field of Countermeasures.

Specifically it aims to:

  • Train the learner to ensure environments
  • Train the student to use the appropriate terminology and incorporate it to your vocabulary.
  • To train the student for the management of different resources and devices in the location of threats.
  • To train the student in a work methodology specific to TSCM.
  • To train the student in the preparation of technical reports.

 

2. CONTENT

Module A: Concepts and History of Security and Communications

Lesson 1

  1. Electronic Surveillance
  2. Against surveillance
  3. Data protection
  4. The Intellectual Property
  5. Leaks

Lesson 2

  1. TSCM Needs
  2. Vulnerabilities
  3. Threats
  4. Scenarios
  5. Risk analysis

Lesson 3

  1. Radio Frequency
  2. Radio spectrum
  3. Concepts electricity
  4. Wiring and electrical Circuits
  5. Microphones

Lesson 4

  1. Telephone lines
  2. Technologies transmission
  3. Channels of Communication
  4. Listening-devices
  5. Review and Research Environments
  6. Technical Procedures

Lesson 5

  1. Measures Active and Proactive
  2. Safety assessments
  3. Audio
  4. Video
  5. Data

Lesson 6

  1. Amplifiers and Oscilloscopes
  2. Static Electricity
  3. Power supplies
  4. Propagation of the Waves

Module B: Technologies for Detection

Lesson 7

  1. Detection
  2. Passive Devices
  3. Active Devices
  4. Lines of Defense
  5. Searches, physical methods

Lesson 8

  1. Detection devices
  2. Detection of tones
  3. Polarities of Antennas
  4. Harmonics
  5. Spurious
  6. Noise
  7. Pulses of the Video sync

Lesson 9

  1. Emitters and Receivers
  2. Receivers of Broadband
  3. Current Carriers and Sub-carriers
  4. Side Bands
  5. Ultrasound
  6. TDR or FDR
  7. X-Rays
  8. Microwave
  9. WIFI, Bluetooth
  10. AM, FM, UHF, VHF,HF

Lesson 10

  1. Telephony, History
  2. 1G, 2G, 3G, 4G
  3. 800,900, 1800, 1900, 2400
  4. GSM, CDMA,EDGE,HSDPA, DECT
  5. UV,
  6. Security seals
  7. Types of attacks
  8. Checks

Lesson 11

  1. Components of the phone
  2. Call systems
  3. Ecu
  4. Analog Telephony
  5. Digital Telephony
  6. Lines truncated
  7. VOIP
  8. Threats, intrusions, Software (WireShark, Cain and Abel.........Callrex)
  9. Protocols
  10. Analysis of Networks
  11. Check Wired Ethernet

Module C: Technical Threats

Lesson 12

  1. Laser
  2. Frequencies
  3. Types of attacks
  4. Data, Audio and Video
  5. Protection TEMPEST

Lesson 13

  1. Existing equipment
  2. Equipment suppliers
  3. Equipment High Power
  4. Sources of Information
  5. Inhibitors
  6. EMSEC: Emissions Electromagnetic, reading, translation/interpretation

Module D: Infrared Thermography

Lesson 14

  1. Introduction to Thermal imaging
  2. Science Heat and heat transmission
  3. Use of the Camera and types
  4. Measurement techniques
  5. Countermeasures for Thermal imaging

 

Module E: Encryption and Intelligence

Lesson 15

  1. Methods Of Encryption
  2. SCADA systems
  3. Business intelligence
  4. Obtaining Information
  5. Humint
  6. Osint
  7. Sigint

Module F: Ethics

Lesson 16

  1. Terminology
  2. Procedures Searches
  3. Reporting
  4. Ethics and Morality
  5. Legal Framework

Module G: Practical Exercises

Lesson 17

  1. Practices 1 Hz to 1 Ghz
  2. Practices 1 Hz to 3 Ghz
  3. Practices 1 Hz to 10 Ghz
  4. Practical Thermography
  5. Practical Telephony
  6. Search for devices NLJD

 

Work teams

  • Thermal camera
  • Spectrum analyzers
  • Testers
  • Ultraviolet Light
  • Markers UV
  • Detectors NLJD
  • Portable detectors of frequencies and GSM/3G
  • Portable detectors of activity cellular 2G/3G/4G / WiFi/Bluetooth

 

Threats:

  • Hidden cameras RF/cable/IP
  • Hidden microphones
  • Mini digital recorders
  • Transmitters of different frequencies
  • Beacons GPS

 

 


SPACE LIMITED!

 

 

 

1432
8435396406075
17
You might also like