• Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles

Call us Anton +62-813-8332-6388 (Phone/WA/Telegram)

antonsim@heilandsolutions.com
Rp 0
No products in the cart
Go to shop
Heiland Consulting & TrainingHeiland Consulting & Training
Heiland Consulting & TrainingHeiland Consulting & Training
  • Home
  • About Us
    • Our Team
    • Our Partners
  • Consulting
    • Security Risk Assessment
    • Integrated Security Design
    • Project Management
    • Security Audit
    • Penetration Test
    • Cost estimation
    • TSCM Service
  • Training
    • Certification
      • CCTP
      • CITA
      • CPSC
      • ASIS CPP
      • ASIS PSP
      • ASIS APP
      • HSE (coming soon)
    • Non-Certification
      • Security Risk Assessment
      • TVRA
      • Developing Business Case for Security Projects
      • Security Management at Events
      • Security Operations at Events
      • Open Source Intelligence (OSINT)
      • Online Investigation
      • Twitter for Security
      • Monitoring Extremist Groups on Telegram
    • Others
      • Counter Drone
      • Assessing Social Media Vulnerabilities
      • Counter Espionage for Business Travellers
      • Social Engineering Mitigations
    • Schedule
    • Online Training
  • Shop
    • Catalogue
    • Shopping Cart
    • Terms and Conditions
  • Contact Us
  • Articles
NameSummaryPriceBuy
ASSESSING SOCIAL MEDIA VULNERABILITIES (Online)

While social media platforms provide tremendous benefit for individuals as well as organizations in
both network expansion and the sharing of information, such platforms are also aggressively exploited by criminal organizations and intelligence services for targeting their victims. Users typically are not aware of how information and shared images can provide sensitive and exploitable information facilitating personal identity theft as well as significant data breaches for organizations. However, these vulnerabilities can be significantly reduced and associated risks better mitigated by implementing several critical safeguards.

Rp 2.000.000
Certified Counter-Terrorism Practitioner (CCTP)

At the Certified Counter Terrorism Board, we have developed and maintained a voluntary and comprehensive certification scheme that is recognized as the standard of excellence for competent counter terrorism professionals. It has been designed by practitioners, for practitioners. This is critical, as it is only through understanding the threat of terrorism globally, having the ability to identify the various threats and modus operandi of the terrorist, and possessing the ability to assess the risk and to implement the necessary processes and technological protective measures, that we have the ability to prepare and respond to terrorist acts efficiently and effectively.

Rp 27.500.000
Certified Intelligence Analyst (CITA)Rp 27.500.000
Certified Physical Security Consultant (CPSC)

The Counter Terrorism Certification Board has established and maintains a voluntary and comprehensive certification scheme — Certified Physical Security Consultant (CPSC). It grants the CPSC certification and maintains it as the recognized standard of excellence for competent security and law enforcement professionals.

Rp 35.000.000
Read more
Counter Drone Course

The use of drones have progressed quickly for all types of activities such as agricultural assessments,
infrastructure inspections, security patrol and the delivery of goods. Unfortunately, there are also
darker consequences with the use of this technology. Drones are being used by terrorists as a cheap,
effective way to gather intelligence or the perfect tool to deliver a variety of physical and
cybersecurity threats. This course is designed to understand the threat we are facing, what should we
expect, what are the most relevant modes of attack, and how to counter those risk and to protect our
soldiers, forces, Airports, bases etc. In this course we will include case studies and samples from
global incidents, review various methods and technologies to detect, neutralize and even destroy
drones, and help the attendees to plan their security process to counteract this threat.

Rp 16.000.000
COUNTER ESPIONAGE FOR BUSINESS TRAVELLERS (Online)

In an increasingly competitive business environment, companies are at risk of having their sensitive proprietary information and technology stolen by direct competitors as well as nation states. With the rise in global travel across several countries and continents, business travelers have become a frequent and accessible target of corporate espionage. In this interactive online course, participants will discover the prevalence of corporate espionage, learn strategies to protect sensitive proprietary information and technology and develop greater situational awareness of such threats when they travel.

Rp 2.000.000
Developing Business Case for Security Projects

You have completed your security risk assessment. Now it is time to move on to close the gaps
identified there. But many of the action items require investment. How do you convince your senior
management to give their approval? This course will equip you with the techniques on how to secure
approval from your management for your security initiatives.

Rp 6.000.000
Monitoring Extremist Groups on Telegram (Online)

In recent years Telegram has become the platform of choice for a wide range of extremist and
terrorist groups. In this training, students will learn how to locate and track these groups’ online
activities.

Rp 2.000.000
Online Investigation (Online)

Students will learn the techniques and tools used in OSINT investigations around an individual, group
or organization. Students will practice building a comprehensive profile of a target, starting with a
single piece of information.

Rp 2.000.000
Open Source Intelligence (OSINT)

In this 3-day course and hands-on workshop, students will learn the tools and techniques used in the field of Open Source Intelligence. With special emphasis on social media monitoring, research and analysis, this training is designed to enable security professionals to better discover, evaluate and understand threats, and to conduct efficient online investigations on individuals and organizations. Upon completion of the training, participants will gain better understanding of their role in the Intelligence Cycle; become familiar with a wide range of social media platforms and the tools and techniques that are needed in order to get the most out of these sources; be able to build a real-time threat-detection system and implement it on any computer; be able to conduct online investigations to uncover a target’s background and network of contacts, while staying safe and not compromising their online identity; understand and use advanced analytic techniques.

Rp 20.000.000
Security Management at Events (Online)

Concerts, exhibitions and conferences are among several events in Singapore that require a competent team of security officers to ensure that the security operations at the event runs smoothly and successfully. Besides managing the security operations at the events, the security supervisor must also liaise with other stakeholders of the event. Security supervisors will need to know key function areas of security operations at events. They will need to be able to identify and mitigate security and safety risks at events. They will need to be equipped with strategies to manage security operations at events. Security supervisors must also be able to manage security and safety incidents at the event.

Rp 2.000.000
Security Management for Critical National Infrastructure (New)

Covering essential areas in security management at critical national infrastructure environment, and
based on the latest standards and regulations in the industry, this course will equip security
professionals to effectively manage security in critical national infrastructure environment.

Rp 9.000.000
Security Operations at Events (Online)

Concerts, exhibitions and conferences are among several events in Singapore that require a
competent team of security officers to ensure that the security operations at the event runs smoothly
and successfully. This workshop aims to develop necessary skill sets and knowledge all security officers working at events should possess. Participants for this workshop will be given an overview of the main roles and responsibilities expected of security officers at events and strategies to manage security and safety incidents occurring at events.

Rp 2.000.000
Security Risk Assessment

This course incorporates classroom sessions followed with class presentation. After lectures in the
classroom, students will go to sample site (if applicable) and develop their own assessment reports
and presentation, based on the knowledge gained in the classroom.

Rp 9.000.000
SOCIAL ENGINEERING MITIGATION (Online)

In an increasingly competitive business environment, companies are at risk of having their sensitive proprietary information and technology stolen by direct competitors as well as national states. With the rise in global travel across several countries and continents, business travelers have become a frequent and accessible target of corporate espionage. In this interactive online course, participants will discover the prevalence of corporate espionage, learn strategies to protect sensitive proprietary information and technology and develop greater situational awareness of such threats when they travel.

Rp 2.000.000
Threats Vulnerabilities Risk Assessment (TVRA)

This course incorporates classroom sessions with a Hands-On approach. After lectures in the
classroom, students will go to sample site and develop their own reports and presentation on the 2nd
day, based on the knowledge gained in the classroom. Lectures will include actual report samples,
case studies, security mitigation drawings, videos, and other visual aids from Indonesia and around
the world.

Rp 9.000.000
Twitter for Security: Real-time Information Discovery and Threat Detection (Online)

Student will learn the techniques & Tools used to monitor twitter effectively & deeply, with special emphasis on emerging threats and breaking new.

Rp 2.000.000

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message

heilandsolutions

heilandsolutions

Contact Info

  • Anton Sim
  • +62 813 8332 6388/+62 811 805 434 (Call/WhatsApp/Telegram)
  • antonsim@heilandsolutions.com ask@heilandsolutions.com

© 2025 · www.heilandsolutions.com