The primary role of any government is to secure its borders and protect its citizens. Likewise effective organisations create a safe and secure environment for its staff and customers. The courses we offer will prepare students for the demands faced when ‘defending the realm’ to ‘corporate security’.

Flashpoint RBT

Advances in digital simulation have opened up new possibilities in many fields of instruction. But at the other end of the training spectrum is the growing requirement for reality-based training (RBT), in which trainees are immersed in hyper-real physical recreations of security or combat scenarios to encourage lightning-fast, tactical decision-making.

An Introduction to Military Strategy

This course provides students with an overview of the concept and practice of military strategy. Strategy is the art of getting something done – usually something big, important and/or transformative. In national security terms, design and delivery of effective, viable strategy is the key to achieving critical objectives.

Maritime Security - Controlling the Commons

A significant proportion of world trade and energy supplies moves by ship.  The oceans are thus one of the most critical facilitators of global prosperity. Maritime security is the use of national and international maritime power to ensure this movement is maintained. But doing so is becoming increasingly challenging.   This course introduces students to one of the fundamental strategic security dilemmas of the 21st century – keeping the seas both free and secure.

Fundamentals of Land Electronic Warfare (EW)

EW has many facets that combine to produce a battle winning capability.  During this course we will look at the subtle nuances of each sub-domain associated with EW and clearly define the manner in which each discipline is employed to best effect. This course will provide you with the underpinning knowledge to prepare you for employment in a post associated with EW either as a practitioner or in support of industry.

The Management of Electronic Warfare (EW) Assets

EW in conjunction with cyber warfare is fast becoming a battle winning capability. Ensuring that you understand the key elements of EW and how EW data can integrate with other Intelligence, Surveillance, Target Acquisition and Reconnaissance (ISTAR) assets is key to maximising the capability of your systems. This course will provide you with the ability to maximise the effectiveness of your EW platforms in any given scenario and can be tailored for those who are new to this domain.

Communications Intelligence (COMINT) Fundamentals

A short journey into the world of COMINT.  This course incorporates a combination of overarching theory supported by practical demonstrations and also investigates the current legal and ethical legislation that may affect COMINT activity and lawful intercept. The course will provide students with a clear overview of COMINT and the major factors that affect this task.

The Fundamentals of Spectrum Management

This course covers the key elements of radio frequency (RF) spectrum management including the organisation, policy, processes and procedures required to effectively manage the electromagnetic spectrum (EMS). The course will address the principles of effective spectrum management including the acquisition of spectrum resources and the planning and deployment of spectrum dependant capability.

Battlespace Spectrum Management (BSM) Fundamentals

The BSM Fundamentals course introduces the basics of BSM and covers the main areas that need to be considered when conducting the BSM task. The course provides an overview of the national and international requirements for conducting and coordinating spectrum management activities; BSM procedures and processes that need to be in place to conduct BSM in peacetime preparations and on deployment and the typical organisational structure needed to conduct BSM tasks.

The Radio Controlled IED (RCIED)

The RCIED continues to be a key weapon in the insurgent, criminal and professional terrorist’s arsenal. With the ever increasing numbers of readily available and cheap electronic technologies, the RCIED poses a real threat to the military and law enforcement communities and to those personnel with the responsibility to look after critical infrastructure.

Force Protection ECM (CREW)

The modern terrorist uses the RCIED to great effect; it can be a significant force multiplier and allows the terrorist to target personnel in all environments at all levels. With the increasing use of the RCIED in a global context, the requirement for effective Force Protection ECM to reduce the threat associated with this device remains extant.

Principles of C-IED

Critical analysis of the development of C-IED capabilities from the early campaigns in Northern Ireland and UK to the Balkans, to its evolution into a modern component of military doctrine from Iraq and Afghanistan. This module will study the principles involved in an effective C-IED capability and consider the functions provided to a military force; it will also analyse the similarities required to provide effective capacity for civilian emergency services and the need for coordination at a National level.

C-IED Search

The ability to predict, detect and identify potential IED threats is a core component of C-IED capability which is still evolving as tactics and techniques change in an attempt to defeat security measures and defensive searches. Modern Search equipment is technically advanced but the principles of search remain valid and need to be fully understood if equipment and procedures are to be successful.

Post Blast Investigation

Not every device can be found in time or neutralised successfully, conducting effective post-blast investigations is a critical aspect of gaining valuable intelligence or evidence to pursue and successfully prosecute a perpetrator of IED attacks. Not confined to the field of Policing, Weapons Intelligence operations can add significant value to the forensic investigation to provide early direction to CT investigators or identify possible targets for Special Forces operations.

Improvised Explosive Device Design

As a weapon the IED is dependent on the perpetrator’s knowledge and ability to design and fabricate an effective and safe firing circuit, construct a viable explosive train and design an explosive charge that will achieve the desired target effect. Today this knowledge is readily available in many open sources and it is essential that practitioners are aware of both historical threats and emerging threats; groups will always repeat designs and tactics and individuals could always create new variations. The need is for an IED Defeat specialist who can operate from first principles, identify the threats accurately and formulate safe and effective render safe plans.

Terrorist tactics

The use of an IED is dependent on several factors and a well-trained perpetrator will analyse the selected target with care, conducting recon and rehearsals before committing to an attack. Understanding the reasons why targets are selected, which IED types are suited to a given situation and the procedures used to deploy a device are essential if an accurate threat assessment is to be produced.

Principles of IED Defeat

IED Defeat teams can be either military, law enforcement of even Fire Service based depending on what theatre or country they are operating in. The UK concept of operations has been adopted by almost every nation and organisation in the world and this course is designed to provide detailed examination of these principles. The lessons learned from over 30 years of operating in the high threat environment of Northern Ireland where it was the intent of the perpetrator to kill the IED Defeat operator is valuable knowledge for anyone involved in this role today.

CBRNe Weapons

Critical analysis of historical incidents provides a valuable insight into the types of weapons being considered by terrorist groups and the challenges they need to overcome to produce an effective device. Responder safety is an major issue when dealing with a suspected CBRNe device, however, this has to be balanced against the need to protect the public from the effects of hazardous materials.

Understanding Culture

This five-day course aims to explore the concept of culture and its importance to planning and implementing interventions in the context of security and/ or conflict. Options for integrating cultural factors into decision-making is a key part of the course, as is identifying assumptions and cultural traits that affect our view of others and interpersonal communication. The course explores social, economic and political factors, as well as beliefs, values and communication. Consideration will be given to gender politics and sexuality and how they are expressed and impact upon behaviours. The course provides a brief introduction to the methods of social research, their limitations and strengths. It brings all these factors together in order to draw meaningful conclusions about policy choices, course of actions and implementation.

Aviation Security Management

This five-day course is intended to attract managers and executives who have existing senior leadership responsibilities in the aviation and aviation security sectors, or who are likely to move into these roles in the near future.

Aviation Security Risk & Crisis Management

This five-day course is intended to attract managers and executives who have existing senior leadership responsibilities in the aviation and aviation security sectors, or who are likely to move into these roles in the near future.

Issues in contemporary intelligence and understanding in defence and security

As well as providing an overview of intelligence and understanding processes today, this five-day course examines civil-military relationships, strategic to tactical issues and the challenges posed by changing technology. It examines political, economic, social and technological factors affecting intelligence and understanding. 

Radar Fundamentals

This course is designed to inform and introduce delegates to the background, history and key operating principles used in modern radar technology. Looking back at older legacy systems to more advanced technology, delegates will have an insight into how radar has been, and still is an important part of today’s military and civilian sectors. The course will be delivered with a blend of theory and practical based lessons. Using the theory based knowledge and practical lessons, delegates will increase their understanding of the complex parameters used in modern radar systems and how the changing of parameters and physical elements influences performance and operating capabilities.

Maritime Electronic Attack Course

This course addresses the key fundamentals of Maritime Electronic Attack (EA). The course is designed to introduce delegates to the background, history and key operating principles used in a modern EA environment. A review of older legacy systems through to more advanced technology will give delegates an insight into how EA plays an important role in today’s Maritime Warfare. The course will be cover all key operational aspects and delegates will increase their understanding of EA and how it is applied within modern Anti-ship Missile Defence (ASMD) tactics.

ELINT Technical Analysis

This course addresses key elements of Electronic Intelligence (ELINT) Technical Analysis and will provide delegates with a sound operational understanding and appreciation of ELINT and its role within modern warfare. The course will be delivered with a blend of theory and practical based lessons. The practical elements of the course will be conducted using a state of the art Pulse Analysis Tool, enabling delegates to conduct Technical Analysis of real world parameters. The combination of theory based knowledge and the practical Pulse Analysis Tool ensures delegates increase their understanding of the complex parameters used in radar systems, as well as the skills needed to produce effective and useful ELINT Data files.

Maritime Tactical Electronic Warfare

This course addresses key elements of Tactical Maritime EW and provides delegates with a sound operational understanding and appreciation of Maritime EW and its role in modern warfare. The course includes planning, processes, tactics and procedures required to effectively conduct Maritime EW operations. The subjects are designed to be in line with current generic maritime practices used within modern navies but are not specific to any particular equipment deployed on naval platforms.