Skip to content
NEXT SIGHT

training

OPSEC training

Operational security tradecraft for investigators running online and covert work. The course teaches teams how to find and mitigate data leaks from their devices, sustain anonymity, and build a secure working environment that protects both the investigator and the admissibility of evidence.

Who it's for

Built for teams whose security depends on disciplined tradecraft.

  • Law enforcement
  • Private investigators
  • Intelligence units
  • Corporate security teams
  • Investigative journalists
  • Government investigators

Course outline

Twelve modules, one operational discipline.

Modules can be combined, sequenced, or delivered as a single tailored curriculum. Every topic is scoped to lawful, defensible tradecraft.

Introduction to operational security

Foundations of OPSec and why it is decisive in lawful investigations and covert work.

Identifiable data leaks

Common sources of leakage: metadata, IP addresses, and device-specific identifiers.

Securing electronic devices

Hardening laptops, smartphones, and tablets used in operational environments.

Anonymity and pseudonymity

Sustaining defensible online identities and separating personas from operational activity.

Secure communication

Encrypted channels and tooling for handling sensitive operational information.

VPNs and proxies

Using and configuring VPNs and proxies to mask infrastructure and protect activity.

Browser security

Privacy-focused browsers, extensions, and techniques to prevent leakage of personal data.

Data encryption

Protecting data at rest and in transit against unauthorised access and recovery.

Digital footprint management

Reducing and controlling investigator footprint to avoid attribution and detection.

Incident response

Developing and exercising response plans for breaches, exposure, and compromise.

Case studies and practical exercises

Real-world scenarios and hands-on drills applying OPSec principles end-to-end.

Creating a secure working environment

Setting up secure physical and virtual workspaces for sustained operational security.

Delivery formats

Where and how your team learns.

Instructor-led

Delivered in-person or virtually by experienced practitioners. Scenarios calibrated to your operational environment and threat model.

Online self-paced

Structured modules accessible through our Online Academy, suitable for distributed teams and continuous skills maintenance.

How a programme is built

From threat model to operational discipline.

  1. Step 1

    Scope & threat model

    We define the operational context, adversary profile, lawful boundaries, and the security outcomes the team must achieve.

  2. Step 2

    Module selection

    Modules are combined and adapted into a coherent curriculum sized to mission profile, tooling, and time available.

  3. Step 3

    Hands-on delivery

    Practitioner-led sessions with realistic scenarios, device drills, and tradecraft exercises — in-person, virtual, or self-paced.

  4. Step 4

    Post-training support

    Reference materials, optional refreshers, and follow-on advisory to embed OPSec discipline in day-to-day operations.

Discuss a training requirement.

Share your team's mandate and threat environment. We will propose a tailored OPSec curriculum and delivery plan.

Request a briefing