Training and Education

The mission of our Training Division is to provide the best possible training for the security industry (Chief Security Officers, Security Directors, Security Managers, Corporate professionals, new cadets, in-service officers and police personnel from agencies who avail themselves of our services).

The training Division has a cadre of experts who create and write lesson plans, which fits to the needs of our clients.

Courses Offered


Target Management

Target management supports by identifying and prioritizing potential targets within the operational area and ensuring measures are established for reducing each target’s relative risk. In many cases the use of CARVER (Criticality, Accessibility, Recuperability, Vulnerability, Effect and Recognizability) is integrated.

Threat Management

Threat management is a mission essential task that supports DAVA (Domain Awareness Vulnerability Assessment) by identifying and characterizing the area’s threats. Threat management is made up of four activities:

  1. Threat Inventory
  2. Threat Modeling
  3. Threat Integration
  4. Threat Forecasting


Risk Assessment

A risk-assessment review threat factors and impact/consequences upon the target and identifies vulnerabilities (vulnerability assessment), which are currently present. During the vulnerability analysis, risk-assessment compares the potential target’s security attributes with OPFOR (Opposing Force) capabilities, intentions, tactics, techniques and procedures (TTP), and recent attack trends, identifying vulnerabilities and developing target hardening recommendations (mitigation options and counter measures).

Collection Management (Data sourcing and aggregation)

The collection management and planning task involves ensuring the quality, relevance and timeliness, and quantity of the information that feeds the intelligence process. The collection management task aims to identify information channels for satisfying each priority collection requirement tied to indicators and sub-tier specific information requirements. The strategy development includes leveraging / exploiting all available information resources, including Open Source Intelligence (OSINT), as well as information channels tied to available sensitive resources, and field units.

Intelligence Analysis

The essential intelligence analysis role of this program is to compile, fuse, analyze, and disseminate intelligence and other information to support efforts to anticipate, identify, prevent, and/or monitor Opposing Force (OPFOR) or aggressor activity.

Threat Recognition

This lesson plan serves as a means for situational awareness, analyzing and synthesizing all-source information, and scanning the information stream for indications of an emerging threat. To do this, GTEW (Geocentric Threat Early Warning) Program exploits information extracted from all available sources, ranging from raw leads collected through reconnaissance, to finished intelligence reports provided though national and global information channels such as OSINT Department of State, Department of Defense, CIA Twitter, etc.

Consequence Assessment

The emphasis of consequence assessment is to anticipate how potential hazard events will behave and identify what response resources will be needed to mitigate the hazard. The net-assessment provides the intelligence analysts and staff level personnel within the Virtual Joint Operation Center (V-JOC) with current situational intelligence, threat course of action forecasts, hazard consequence forecasts, and resource availability / requirement profiles.


Xpertisehub offers many training courses focused on security. The courses on implementing the NIST Cybersecurity Framework and assessing for security equipped individuals with key cybersecurity guidance and the knowledge needed to demonstrate capabilities in these areas of security.

Digital Forensics Training (Basic & Advanced)

Foundation Futuristic Technologies (P) Ltd. offers a wide range of digital investigation and cyber forensics training courses for intelligence professionals. Structured and customized classes are available in computer forensics, visual and data analysis, mobile forensics, and CDR Analysis to our clients enabling them to address their training needs.

Event Security

Events (be it corporate or public) involves life safety, asset security & brand/ reputation risks. In today’s high-risk security environment, an understanding of the program objectives, location, venue, identifying participants & high-visibility/ high-risk personnel, event duration, vendor management, planning for parking, transport/ commute etc. must begin weeks before actual event. It actually involves setting up a steering committee for advance planning & control room for contingency management. A whole lot of detailing, environmental monitoring, local liaison, public responder coordination, media management and scenario building (what-if-situations) are required before the actual day of event. The art & science of end-to-end planning & securing of large meeting, celebration, conventions and entertainment events is collectively called ‘Event security management’.

Executive Protection

Due to political importance, business success, prosperity and media focus, people who are High-Networth- Individuals (HNI) or Leaders in any area of human endeavor have a greater chance of being targeted for harm, by ‘interest groups’ or ‘criminal syndicates’ in order to negate their success, affect a business corporation or a nation’s political journey/ destiny. Planning protection strategies for them at office, home, travel or when hospitalized is generally called ‘VVIP Security’ or ‘Close protection’ or in Corporates, when senior board members or execs are protected, called ‘Executive protection’. This course program is also important from the point of Business Continuity and Reputation/ Brand protection of a business or country’s political stability.

Women Security & Safety

Women population are being increasingly integrated into the economic life of a nation & assuming positions of influence and responsibility. Most societies which have been traditionally patriarchal with stereotypical views about women’s’ roles in society have seen violence and assault on women at homes, public places and workplaces. Men population in many countries still do not see economic independence of women favorably and have very misplaced notions about how women should clothe themselves, work & socially interact in communities. This awareness building course examines various issues leading to women safety & security and help guide male behavior in order to build a just & equitable society wherein women are respected, where women can protect themselves from harm and also react, remediate & report unfavorable circumstances in public and private life. 

School Security

In recent times, fringe groups and criminal syndicates are adopting the ‘asymmetric warfare’ of terrorism with more & more brazen and dastardly attacks on general population (i.e. general population who are not involved in law enforcement, regular combat or public order preservation). So, the protection of ‘soft targets’ has assumed great importance because terrorists are shifting focus to schools, hospitals, learning institutions etc. in order to extract ‘maximum shock value & media mileage’ for their campaign against the State. After recent cases of external terrorist or insider attacks in schools, colleges, universities campuses or on locations where children reside/study/work/ play….the imperative of student campus security has become very urgent. Traditionally, such facilities or real-estate are not protected from terrorist & insider threats, by design or default. Therefore, such protection programs have to be built from scratch by involving all stakeholders in the community. This program examines various issues related to School/ College/ University security program.