What You Need to Know Before
You Start
Starts 10 June 2025 22:15
Ends 10 June 2025
00
days
00
hours
00
minutes
00
seconds
1 hour 2 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore subversion and espionage tactics directed against individuals, enhancing awareness of personal security threats and countermeasures.
Syllabus
- Introduction to Subversion and Espionage
- Understanding Personal Security Threats
- Subversion Tactics
- Espionage Techniques
- Identifying and Assessing Threats
- Countermeasures and Personal Security Practices
- Legal and Ethical Considerations
- Developing a Personal Security Plan
- Conclusion and Review
Definition and Overview
Historical Context and Modern Relevance
Key Actors Involved
Profiles of Targeted Individuals
Common Tactics Used Against Individuals
Psychological Manipulation and Its Impact
Infiltration and Recruitment
Spread of Disinformation
Social Engineering Techniques
Surveillance Strategies and Technologies
Data Breaches and Cybersecurity Threats
Physical Security Threats and Countermeasures
Indicators of Being Targeted
Risk Assessment Methodologies
Case Studies of Notable Espionage Incidents
Digital Security: Passwords, Encryption, and Safe Communication
Physical Security Measures: Awareness and Evasion
Psychological Resilience and Mindfulness
Laws Protecting Individuals Against Espionage
Ethical Implications of Surveillance and Data Collection
Creating a Personalized Threat Model
Implementing Proactive Security Measures
Ongoing Monitoring and Adaptation Strategies
Key Takeaways
Resources for Further Learning
Q&A and Open Discussion
Subjects
Conference Talks