Course Catalog
Professional security training across 14 regions.
ESIG-C01
Protective Operations
Carjacking Countermeasures
Contramedidas contra el Carjacking
Advanced countermeasures training for security professionals operating in high-threat environments. Covers threat intelligence, behavioral analysis, response protocols, and technological solutions for carjacking prevention and survival.
ESIG-C02
Counter-Threat
Counter-Insurgency Theory & Tactics
Teoría y Tácticas de Contrainsurgencia
Advanced strategic and operational COIN approaches for security professionals. Covers insurgent organizational theory, population-centric operations, intelligence-driven targeting, and civil-military coordination with case studies from Colombia, Peru, Mexico, and global theaters.
ESIG-C03
Surveillance/TSCM
Electronic & Physical Surveillance Methods & Countermeasures
Métodos de Vigilancia Electrónica y Física
Comprehensive training in surveillance detection, technical surveillance countermeasures (TSCM), and counter-surveillance operations. Covers electronic eavesdropping, physical surveillance techniques, RF detection, and sweep procedures for high-threat environments.
ESIG-C04
Protective Driving
Executive Protection Driving Techniques
Técnicas de Conducción para Protección Ejecutiva
Intensive advanced driving course bridging defensive driving and executive protection motorcade operations. Covers vehicle dynamics, evasive maneuvers, ambush response, motorcade formations, and route planning for high-threat environments worldwide.
ESIG-C05
Intelligence
Field Intelligence for Special Operations
Inteligencia de Campo para Operaciones Especiales
Tactical and operational intelligence collection for special operations forces. Covers the intelligence cycle, collection management, multi-source fusion, targeting (F3EAD), and field reporting in denied and constrained environments.
ESIG-C06
HUMINT
Human Intelligence Collection and Analysis (HUMINT)
Recopilación y Análisis de Inteligencia Humana (HUMINT)
Comprehensive HUMINT operations training covering source spotting through asset termination, raw collection through finished intelligence analysis. Practitioner-centered approach with real-world scenarios, role-play exercises, and case study analysis.
ESIG-C07
Counter-Threat
Insurgent Explosive Devices (IEDs & VBIEDs)
Artefactos Explosivos Improvisados (AEI) y Artefactos Explosivos Vehiculares (AEV)
Threat recognition, assessment, and countermeasures for improvised explosive devices and vehicle-borne explosives. Covers device construction theory, detection indicators, blast effects, route clearance, and post-blast investigation.
ESIG-C08
Counter-Threat
Insurgent Theory & Tactics
Teoría y Tácticas Insurgentes
Comprehensive analysis of insurgent organizational theory, operational methods, and tactical employment. Emphasizes Latin American contexts including narco-insurgency hybrid organizations in Colombia, Peru, and Mexico.
ESIG-C09
Intelligence
Operational Intelligence
Inteligencia Operacional
Foundational intelligence discipline transforming raw information into actionable products. Covers the full intelligence cycle, collection planning, all-source analysis, targeting (F3EAD), and OPSEC.
ESIG-C10
Tactical
Protective Operations Tactical Shooting Drills
Instrucción en Tiro Táctico para Operaciones de Protección
Integrated tactical shooting and protective operations training. Combines advanced marksmanship with team movement, vehicle operations, and threat assessment for close protection professionals in high-threat international environments.
ESIG-C11
Protective Operations
PSD Protection Details
Detalles de Protección PSD
Comprehensive close protection training covering PSD doctrine, tactics, and operational skills. Covers threat assessment, advance work, protective formations, crisis response, communications, and team coordination for protecting executives, politicians, and high-risk clients.
ESIG-C12
Threat Assessment
Stalkers & Other Dangerous Individuals
Acosadores e Individuos Peligrosos
Identification and management of stalking behaviors and dangerous individuals. Covers typologies (rejected, resentful, predatory, intimacy-seeking), structured threat assessment (HCR-20, SAPR-V), victim safety planning, workplace violence prevention, and law enforcement coordination.
ESIG-C13
Surveillance/TSCM
Telephone Eavesdropping & Countermeasures
Interceptación Telefónica y Contramedidas
Deep technical training on telephone network vulnerabilities, interception methods, and countermeasures. Covers PSTN/SS7 vulnerabilities, IMSI catchers, VoIP exploitation, commercial spyware (Pegasus), TSCM sweep procedures, and secure communications implementation.
ESIG-C14
Counter-Terrorism
Terrorism: The Whole Story
El Terrorismo: La Historia Completa
Comprehensive study of terrorism from historical trajectories through contemporary threats. Covers ideological motivations, organizational structures, financing mechanisms, radicalization pathways, and community resilience strategies with regional case studies.
ESIG-C15
Protective Operations
VIP Protection for Corporate Executives
Manual de Protección VIP y Ejecutiva Corporativa
Complete VIP and corporate executive protection training. Covers threat assessment, protective planning, close protection skills, team operations, travel security, family protection, and crisis management in international contexts.
ESIG-C16
Criminal Intelligence
Criminal Intelligence Collection & Analysis
Recopilación y Análisis de Inteligencia Criminal
Advanced criminal intelligence methodology covering organized crime analysis, financial crime investigation, network mapping, threat assessment, and cross-border intelligence coordination with a focus on Latin American criminal networks.
ESIG-C17
Emerging Tech
Counter-UAS Threat Awareness & Countermeasures
Conciencia de Amenazas y Contramedidas contra Sistemas Aéreos No Tripulados
Comprehensive drone threat awareness and countermeasures training. Covers UAS threat landscape, detection technologies, electronic and kinetic countermeasures, airspace management, and C-UAS program design for critical infrastructure and VIP protection.
ESIG-C18
Emerging Tech
AI-Powered Deception & Deepfake Defense
Engaño Potenciado por IA y Defensa contra Deepfakes
Cutting-edge training on AI-powered social engineering, deepfake threats, and digital deception countermeasures. Covers deepfake detection, AI-generated phishing, voice cloning, synthetic media analysis, and organizational defense frameworks.
All 18 courses available — enroll now to lock in early pricing.
View Pricing & Packages