training
OPSEC training
Operational security tradecraft for investigators running online and covert work. The course teaches teams how to find and mitigate data leaks from their devices, sustain anonymity, and build a secure working environment that protects both the investigator and the admissibility of evidence.
Who it's for
Built for teams whose security depends on disciplined tradecraft.
- Law enforcement
- Private investigators
- Intelligence units
- Corporate security teams
- Investigative journalists
- Government investigators
Course outline
Twelve modules, one operational discipline.
Modules can be combined, sequenced, or delivered as a single tailored curriculum. Every topic is scoped to lawful, defensible tradecraft.
Introduction to operational security
Foundations of OPSec and why it is decisive in lawful investigations and covert work.
Identifiable data leaks
Common sources of leakage: metadata, IP addresses, and device-specific identifiers.
Securing electronic devices
Hardening laptops, smartphones, and tablets used in operational environments.
Anonymity and pseudonymity
Sustaining defensible online identities and separating personas from operational activity.
Secure communication
Encrypted channels and tooling for handling sensitive operational information.
VPNs and proxies
Using and configuring VPNs and proxies to mask infrastructure and protect activity.
Browser security
Privacy-focused browsers, extensions, and techniques to prevent leakage of personal data.
Data encryption
Protecting data at rest and in transit against unauthorised access and recovery.
Digital footprint management
Reducing and controlling investigator footprint to avoid attribution and detection.
Incident response
Developing and exercising response plans for breaches, exposure, and compromise.
Case studies and practical exercises
Real-world scenarios and hands-on drills applying OPSec principles end-to-end.
Creating a secure working environment
Setting up secure physical and virtual workspaces for sustained operational security.
Delivery formats
Where and how your team learns.
Instructor-led
Delivered in-person or virtually by experienced practitioners. Scenarios calibrated to your operational environment and threat model.
Online self-paced
Structured modules accessible through our Online Academy, suitable for distributed teams and continuous skills maintenance.
How a programme is built
From threat model to operational discipline.
Step 1
Scope & threat model
We define the operational context, adversary profile, lawful boundaries, and the security outcomes the team must achieve.
Step 2
Module selection
Modules are combined and adapted into a coherent curriculum sized to mission profile, tooling, and time available.
Step 3
Hands-on delivery
Practitioner-led sessions with realistic scenarios, device drills, and tradecraft exercises — in-person, virtual, or self-paced.
Step 4
Post-training support
Reference materials, optional refreshers, and follow-on advisory to embed OPSec discipline in day-to-day operations.
Discuss a training requirement.
Share your team's mandate and threat environment. We will propose a tailored OPSec curriculum and delivery plan.