The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by vinny.smith, 2023-03-17 10:49:51

Training Brochure PPT

Training Brochure PPT

TRAINING OVERVIEW One of the benefits of Raspberry Pi is that it is not necessary to have an intimate knowledge of Linux or Python before beginning a project with Raspberry Pi. In fact, the purpose of the product is to teach the system and language through engaging projects. It is beneficial that participants complete the raspberry pi essentials first. The Raspberry pi video course will focus on how this microcontroller can be used for video projects in the surveillance arena. Our training team will instruct operators in camera selection, (network and USB ) Visualization server, choices, setup and options. Once the video/stills can be viewed participants will learn how to integrate sensors and actuators into the video system • Select mission specific Raspberry Pi compatible cameras • Construct standalone video surveillance systems with historic recording capability • Actualize motion detection recording • Produce video devices that are encrypted and connected over a virtual private network which can be visualized globally. • Understand complex parameters needed to record and view cameras over a network • Automatically start recording video on external triggers such as passive infrared • Establish email notifications Participants Completing this training will be able to:


COTS PYTHON AI AIM This course aims to equip learners with the knowledge and skills necessary to harness the power of ChatGPT, an advanced AI language model, for Python development on Raspberry Pi devices in the context of technical surveillance. Through hands-on experience, learners will explore code generation, AI-assisted debugging, and error checking, focusing on maximizing efficiency and performance in their Raspberry Pi-based surveillance projects. DURATION 5 DAYS


Discover the power of ChatGPT, a cutting-edge AI language model by OpenAI, for Python development on Raspberry Pi in the realm of technical surveillance. In this course, you'll explore the benefits of using ChatGPT to write, debug, and maintain Python code on Raspberry Pi devices, with a focus on building efficient and innovative surveillance solutions. Gain hands-on experience with code generation, error checking, and AI-assisted debugging specifically for Raspberry Pi projects. By the end of the course, you'll be equipped with the knowledge and skills to integrate ChatGPT into your Raspberry Pi-based surveillance projects, maximizing efficiency, code quality, and overall performance. Participants Completing this training will be able to: TRAINING OVERVIEW • Understand the capabilities and limitations of ChatGPT in the context of Python development and Raspberry Pi-based technical surveillance projects. • Generate efficient, clean, and functional Python code snippets for Raspberry Pi applications using ChatGPT. • Utilize ChatGPT for debugging, error checking, and code optimization, with a focus on Raspberry Pi-specific clandestine challenges • Apply the knowledge and skills acquired in this course to create and maintain larger, more complex Raspberry Pi surveillance projects. • Explore the potential of ChatGPT for generating code documentation, comments, and its applicability in other programming languages and platforms


COTS OPEN SOURCE WEBSERVERS AIM This course aims to equip military technical surveillance professionals with the knowledge and skills to prototype and develop situational awareness applications using opensource webservers and AI assistance. DURATION 5 DAYS


TRAINING OVERVIEW Our training team will teach operators how to use open source webservers and artificial Intelligence, capitalizing on the ubiquity of internet-connected devices in the digital age. Through hands-on projects, participants will learn the fundamentals of web languages like JavaScript, HTML, and CSS, enabling them to create advanced surveillance solutions that integrate seamlessly with a variety of data sources and devices. By the end of the course, learners will be proficient in harnessing the full potential of open-source webservers and AI, building sensor networks that can be viewed, controlled, and manipulated via a web server, and responding to data effectively to achieve mission-critical objectives. • Understand the importance and role of web languages (JavaScript, HTML, and CSS) in creating advanced surveillance applications. • Build a versatile sensor network using various COTS data sources (mobile phones, Arduino, Raspberry Pi, and IP cameras) that can be viewed and controlled via a web server and integrated with pre-existing mesh and messaging servers. • Master data manipulation and advanced triggering and visualization techniques in open source webservers, utilizing AI to optimize responsiveness and effectiveness in various mission scenarios Participants Completing this training will be able to:


COTS NON STANDARD COMMUNICTIONS AIM This course aims to provide specialist covert operators with the knowledge and skills necessary to modify and adapt commercial equipment and software for use in non-standard communication operations DURATION 5 DAYS


In this course operators will learn how to develop a comprehensive range of communication strategies and evaluate their appropriateness for different military scenarios and potential threats. Gain practical experience with electronic dead letter boxes and investigate their utility in clandestine military missions. Learn how to establish and maintain secure communication channels via the Dark Web while protecting operational intelligence. Acquire the expertise to customize and adapt commercial networks for military use, utilizing advanced technologies like transceivers, cellular networks, and internet-based server communication By emphasizing the importance of versatile communication approaches, the course will enable operators to overcome potential threats and maintain operational efficiency in diverse and challenging environments Participants Completing this training will be able to: TRAINING OVERVIEW • Design and implement an electronic dead letter box for secure, covert communication. • Set up a secure Dark Web communication channel for military operations. • Execute a commercial network adaptation and modification project, tailoring off-the-shelf technology for military communication needs.


COTS EXPEDIENT ANTENNA DESIGN AIM The primary aim of this course is to provide participants with the knowledge and skills required to design, construct, and optimize expedient antennas with commercial off-the-shelf (COTS) materials, with a focus on the experimental radio bands. DURATION 5 DAYS


TRAINING OVERVIEW The emphasis of the training is on the importance of starting with a solid design foundation before moving on to the practical aspects of constructing field expedient antennas. Participants will learn how to adapt and optimize their designs based on material availability and specific requirements. Through hands-on projects and real-world examples, operators will gain valuable experience in creating custom antenna solutions for various devices in different frequency bands, enabling them to enhance their functionality and performance. By understanding the fundamentals of radio frequency (RF) and antenna theory, participants will be able to create tailored antenna solutions using readily available materials. • Grasp the fundamentals of radio frequency (RF) theory, including propagation, transmission, and factors affecting signal strength and quality. • Learn the basic principles of antenna theory, such as types, characteristics, radiation patterns, polarization, gain, efficiency, and bandwidth. • Master the process of designing and constructing expedient antennas for various frequency bands, with a focus on experimental radio bands. • Acquire practical fabrication techniques for building antennas compatible with common COTS devices, optimizing performance and range. • Gain experience in troubleshooting and refining antenna designs to enhance efficiency and adapt to specific use cases. Participants Completing this training will be able to:


COTS VEHICLE FIT COMMUNICTIONS AIM The primary aim of the Covert Communications Vehicle Integration Course is to provide clandestine operatives with a comprehensive understanding of communication technologies and their seamless integration into vehicles for covert missions DURATION 5 DAYS


The Covert Communications Vehicle Integration Course equips clandestine operatives with the necessary abilities and knowledge to proficiently integrate communication technology into a vehicle, enabling seamless communication with fellow operatives or the command center. Successful communication among team members is critical for the success of most surveillance missions and is a vital component of all operations. It is essential for operatives to discreetly and continually relay information about targets, potential dangers, and their current status. Participants Completing this training will be able to: TRAINING OVERVIEW • Selecting Radio Communications Options • Understanding Radio Features • Replacing Vehicle Antennas for Communication Purposes • Alternative Antenna Placements and Concealment Methods • Commercially Available Harnesses for specific radios and their providers • Basic footwell concealment techniques • Traps and concealment solutions for equipment


COTS VEHICLE FIT SURVEILLANCE AIM The aim of this course is to develop proficient covert operators who are capable of seamlessly integrating advanced surveillance technology into vehicles, while maintaining discretion and avoiding detection, in order to successfully execute vehiclebased surveillance missions and intelligencegathering operations DURATION 5 DAYS


TRAINING OVERVIEW This comprehensive course is designed to equip covert operators with the essential skills and knowledge needed to proficiently install technical surveillance technology within vehicles for use in surveillance missions. With a significant number of surveillance operations and reconnaissance relying on vehicle-based methods, it is crucial for operatives to be well-versed in fitting vehicles with advanced equipment while maintaining discretion. Throughout the course, students will learn the intricacies of effectively concealing surveillance and intelligence-gathering devices to avoid detection during vehicle inspections. Upon successful completion, participants will possess the expertise and tools required to seamlessly integrate a wide range of surveillance equipment into any vehicle for use in covert operations. • Trim and panel removal • Headrest camera concealment • Pinhole Camera Wing Mirror Fits • Roof-top box fits • Engine cut-oof techniques • Network device installation • Canbus consideration • Changing the profile of the vehicle Participants Completing this training will be able to:


COTS VEHICLE FIT TARGET AIM The aim of the Target Vehicle Fit Course is to develop operators to be capable of effectively and discreetly installing technical surveillance technology in to target vehicles DURATION 5 DAYS


The Target Vehicle Fit Course is designed to equip covert operators with the essential skills and knowledge necessary for effectively fitting a vehicle with technical surveillance technology. This course focuses on enabling participants to gather valuable intelligence on identified targets by leveraging their daily-use vehicles. Emphasizing practical planning and time management, students will gain hands-on experience in applying a variety of techniques and best practices for covert vehicle surveillance. By the end of the course, participants will be proficient in executing covert vehicle-based intelligence gathering operations, ensuring the success of their missions and the security of their organizations This comprehensive course includes topics such as: TRAINING OVERVIEW •Identifying and tracking target vehicles • Covertly accessing and securing vehicles for surveillance purposes • Selecting and installing appropriate surveillance devices • Efficient planning and execution under time constraints • Adapting to various vehicle types and environments • Ensuring the operational integrity of surveillance equipment


CYBER AWARENESS AIM The aim of this course is to equip participants with the essential knowledge and skills needed to proactively defend against and mitigate cyber threats. By fostering an in-depth understanding of cybersecurity awareness, social engineering, network security, and online self-defences, students will be better prepared to safeguard their personal data, devices, and organizations from the growing risks posed by cybercriminals in the digital landscape DURATION 3 DAYS


TRAINING OVERVIEW In today's interconnected world, cyber-attacks pose a significant threat to our nation and its citizens. As reliance on the internet and technology continues to grow, skilled hackers are capable of compromising almost any device to gather valuable intelligence. Cybercrime not only violates individual privacy but also jeopardizes the security of personal data. By the end of the course, participants will have developed a strong foundation in cybersecurity, empowering them to protect themselves, their organizations, and their communities from the ever-evolving risks in the digital world. ● The methodologies and tactics used by hackers ● Identifying red flags in phishing emails and texts ● Navigating the evolving threat landscape ● Strengthening device security and hardening measures ● Implementing proven cybersecurity software solutions ● Configuring browsers securely for enhanced online safety ● Combatting and mitigating online threats ● Isolating vulnerable systems and networks to limit exposure Participants Completing this training will gain knowledge in:


NETWORK SECURITY AIM The aim of this course is to equip students with the essential knowledge and skills needed to design, implement, and maintain secure network infrastructures. Participants will be introduced to various security tools, techniques, and best practices, enabling them to effectively safeguard their organization's networks and data DURATION 5 DAYS


A network consists of a variety of devices, including computers, servers, and wireless networks, which can be vulnerable to potential attackers. Ensuring network security is crucial because it safeguards sensitive information from cyber-attacks and maintains the network's reliability and credibility. To effectively protect users and organizations from malware and cyber-attacks, successful network security strategies utilize multiple security solutions. In this course, students will gain knowledge on how to identify security vulnerabilities throughout the entire network. They will also learn about the ways in which corporations and nation-states track individuals. Additionally, the course will cover the best authentication methods and wireless security practices. Students will gain experience in network monitoring and learn about search engine privacy. Lastly, the course will explore how passwords can be cracked. By the end of this course, students will be able to: TRAINING OVERVIEW • Understand the fundamentals of network security, including threats, vulnerabilities, and countermeasures. • Analyze and implement various security protocols and encryption techniques to protect data transmission across networks. • Configure and manage firewalls, intrusion detection and prevention systems, and other security tools to safeguard network infrastructures. • Design and implement secure network architectures using best practices and industry standards. • Monitor and analyze network traffic to identify potential security breaches and take appropriate remedial action. • Apply critical thinking and problem-solving skills to address real-world network security challenges.


SIGNATURE REDUCTION AIM The aim of this course is to enable surveillance operators to effectively maintain anonymity and protect their digital identities while working in environments where their internet activity may be closely monitored by nation-state adversaries. DURATION 5 DAYS


TRAINING OVERVIEW The Signature Reduction Course is a comprehensive training program designed to equip surveillance operators with the knowledge and skills necessary to remain untraceable online. Through a combination of lectures, hands-on exercises, and practical demonstrations, students will learn about various technologies and techniques to safeguard their online identities, ensuring the integrity of their work and personal safety. Topics covered include Operational Security (OSEC), bootable live operating systems, Virtual Private Networks (VPNs), Tor, proxies, the Invisible Internet Project, off-site connections, and chaining/nesting anonymizing services. ● Understand the principles of Operational Security (OSEC) and apply them to maintain anonymity and protect digital identities in high-risk environments. ● Set up and utilize bootable live operating systems from USB drives to safeguard sensitive data and ensure operational security. ● Configure and effectively use Virtual Private Networks (VPNs) to maintain anonymity and protect internet traffic from monitoring. ● Navigate the Tor network (darknet/dark web) securely and understand its potential applications and limitations in the context of surveillance operations. ● Implement proxies and the Invisible Internet Project (I2P) to further enhance online anonymity and protect digital identities. ● Establish secure off-site connections to maintain operational security and minimize the risk of identity contamination. ● Chain and nest anonymizing services to create multiple layers of protection, ensuring optimal digital security and anonymity in high-risk environments. Participants Completing this training will be able to:


RING DOORBELL DEFEAT AIM The aim of this course is to equip students with the knowledge and practical skills to effectively disable Wi-Fi network cameras using Raspberry Pi and Kali Linux, enabling them to covertly enter premises and defeat security systems in a rapidly advancing technological landscape. DURATION 5 DAYS


This comprehensive course explores the practical applications of Raspberry Pi and Kali Linux in disabling Wi-Fi network cameras for covert operations. Students will gain a thorough understanding of Wi-Fi theory, network monitoring cards, and cloud-based SSH servers. They will also learn how to install Kali Linux, perform deauthentication of Wi-Fi devices, and utilize reverse SSH for remote access. By the end of the course, students will be able to deploy these techniques in real-world scenarios and take security cameras offline from anywhere in the world. By the end of this course, students will be able to: TRAINING OVERVIEW • Understand the fundamentals of Wi-Fi theory and the role of network monitoring cards in surveillance systems. •Install and configure Kali Linux on a Raspberry Pi for network security operations. • Perform de-authentication attacks on Wi-Fi devices to disable network cameras. •Implement reverse SSH to gain remote access to target systems and devices. • Set up and manage cloud-based SSH servers for global reach and remote de-authentication of security systems.


CONTACT US We are committed to providing the highest quality training and support to help you reach your professional goals. Our team is eager to assist you with any questions or concerns you may have. To get in touch with our team, please use the following contact information: For Training Program Inquiries: Contact our Training Coordinator: Vinny Smith Email: [email protected] We encourage you to reach out to us with any questions, comments, or feedback about our training programs. Our dedicated staff is always ready to provide assistance and support. To stay up-to-date with our latest training offerings, news, and events, be sure to visit our website. Website: www.libertyalliance.com


THANK YOU We look forward to hearing from you and supporting your professional development journey. Let's make a positive impact together ! vinny.smith@libertyalliance Crafting experts for the challenges of tommorow Vinny Smith Head Of Training & Development


Click to View FlipBook Version