Seminar Techniques, Electronic Countermeasures and Surveillance
If you want to obtain the knowledge necessary to make your own sweeps radioelectricos to locate cameras, microphones and GPS locators, you must perform this seminar.

ATTENTION: This product is not sold online. To make the purchase must be addressed to our physical stores or request a quote clicking HERE
SEMINAR FOR MONITORING TECHNIQUES IN ELECTRONIC COUNTERMEASURES
Currently, the security sector presents several challenges. Security threats are constantly evolving and the sector must respond trained properly to cope with new risks. Countermeasures and surveillance require a revision and constant update to the few that are advancing the technologies. Hence the importance of this course, the only one of its kind in Spain with the level of update and information more complete.
RECIPIENTS
Security departments, Private Detectives, Security Directors, members of the Armed Forces and State Security Forces, staff of embassies. Professionals that require a degree college in addition to expanding the knowledge already acquired.
SPECIFIC REQUIREMENTS: do Not exist.
1.PRESENTATION AND OBJECTIVE
The objective of the Seminar is to provide the student with theoretical and practical knowledge of surveillance electronic countermeasures (Technical Surveillance Counter Measures) in order to locate and/or neutralize devices or systems of espionage, providing security in different work environments or private in which they can develop their activity.
At the end of this Seminar, the student will have gained the basic ability to distinguish all of the threats and vulnerabilities existing in the different environments, which with practice will develop the characteristics enough to offer his services as a specialist TSCM at the best Corporations, Institutions or Private Companies with the highest quality, in vogue in these times of world crisis by the lack of specialized professionals in the field of Countermeasures.
Specifically it aims to:
- Train the learner to ensure environments
- Train the student to use the appropriate terminology and incorporate it to your vocabulary.
- To train the student for the management of different resources and devices in the location of threats.
- To train the student in a work methodology specific to TSCM.
- To train the student in the preparation of technical reports.
2. CONTENT
Module A: Concepts and History of Security and Communications
Lesson 1 |
|
Lesson 2 |
|
Lesson 3 |
|
Lesson 4 |
|
Lesson 5 |
|
Lesson 6 |
|
Module B: Technologies for Detection
Lesson 7 |
|
Lesson 8 |
|
Lesson 9 |
|
Lesson 10 |
|
Lesson 11 |
|
Module C: Technical Threats
Lesson 12 |
|
Lesson 13 |
|
Module D: Infrared Thermography
Lesson 14 |
|
Module E: Encryption and Intelligence
Lesson 15 |
|
Module F: Ethics
Lesson 16 |
|
Module G: Practical Exercises
Lesson 17 |
|
Work teams
- Thermal camera
- Spectrum analyzers
- Testers
- Ultraviolet Light
- Markers UV
- Detectors NLJD
- Portable detectors of frequencies and GSM/3G
- Portable detectors of activity cellular 2G/3G/4G / WiFi/Bluetooth
Threats:
- Hidden cameras RF/cable/IP
- Hidden microphones
- Mini digital recorders
- Transmitters of different frequencies
- Beacons GPS
SPACE LIMITED!