Shopping cart

shape
shape

All Assignments

4.5 Activity

Homework Workshop: Workshop Objective: To apply qualitative and quantitative methodologies to assess risks in a business scenario, using reliable information sources and competitive intelligence techniques that enable strategic security decision-making. Phase 1: Scenario Selection

Read More

3.5 Activity

Workshop Activities: Phase 1: Regulatory Research. Knowledge of Standards: – ISO 22301 (Business Continuity). – NFPA 1600 (Emergency Preparedness). – EU Directive NIS2 (Cybersecurity). Phase 2: Application of Terminology    

Read More

2.4 Activity

Phase 1 Activities: Research and Contextualization Choose one of these contexts: Financial company with offices in urban areas. Industrial plant in an area at risk of natural disasters. Data center with a high risk of cyber espionage. Threat Analysis: Identify 3 internal threats (e.g., employees with privileged access) and 3 external threats (e.g.,

Read More

14.1 Practical case

PRACTICAL EXERCISE: Strategic Analysis in the Context of Intelligence. Objective of the exercise: To apply strategic analysis in a realistic intelligence environment, integrating the collection, evaluation, and synthesis of information to support high-level decision-making on national and international security matters. General context

Read More

12.5 Exam Integrating Knowledge and Practical Applications

Final Exam: Integrating Knowledge and Practical Applications This final exam is designed to assess your understanding and application of the concepts learned throughout the course. You must address the following aspects: Summarize the key concepts covered in each module of the course. Choose

Read More

10.1 Assumption

Practical Scenario: “Latent Threat in the Northern Corridor” General Context: The Territorial Intelligence Unit (UIT) has received multiple alerts about unusual activity in the Northern Corridor of a medium-sized city. Citizen reports indicate nighttime meetings in an abandoned warehouse, the arrival of vehicles with out-of-state license plates,

Read More

4.1 Assumption

Early Strategic Intelligence Report 📁 CASE STUDY: Increased activity of a radical group on social media in a region of southern Europe Over the past few weeks, various open sources (OSINT) have detected an increase in the activity of a radical group calling itself “Legion of

Read More

11.1 Assumption

📘 PRACTICAL CASE STUDY: Counterintelligence, Security, and Organized Crime 🎯 Objective of the exercise: To enable the participant to apply counterintelligence and security analysis techniques to detect, prevent, and mitigate infiltration, sabotage, or corruption operations promoted by a transnational criminal organization within a public or private institution. 🏢 Case context

Read More

8.1 Assumption

Integrated case study: Operation “SHADOW NEXUS” Brief summary: Operation SHADOW NEXUS simulates an investigation and response to a transnational criminal network that combines organized crime activities (trafficking and extortion), economic espionage targeting a national telecommunications company, and a money laundering scheme that uses

Read More

3.1 Assumption

📘 BRIEF CASE STUDY: Criminal Infiltration at the DeltaSur Port Terminal 🏢 Situation The company DeltaSur Logística Portuaria, which operates in a major Mediterranean port, has reported the following in the last three months: Irregular handling of containers. Losses of high-value merchandise. Personnel evading controls and

Read More

Special Prices for Latin America - Find out about our rates adapted to the region.

Special Prices for Latin America