The cyber threat is not just a technological problem. It is also a behavioral problem. The problem resides in how people interact with cybertechnology because the operator is ultimately the weakest link of the security chain. Meta believes that education and training are key components to help mitigate the cyber threat, and to properly and promptly collect open source and publicly available information. Meta’s instructors have many years of experience in OSINT and Competitive Intelligence; as well as ethical hacking.
Meta currently offers the courses listed below. Contact us to receive detailed information about these courses and custom courses. |
Risk Management When Online
This is our most popular course. We offer it as LMS/Online Module, live-instructor at customer's location and San Diego, CA. This course introduces students to privacy and risk management practices in the Internet; securing cybertechnology such as tablets, smartphones, laptops, and desktops to keep these devices from broadcasting the user’s activities and patterns of interaction in the Internet; understanding social engineering methods and awareness on how to prevent becoming the victim of a phishing and/or social engineering attempt; best practices for interacting with social media platforms. Risk Management When Online - Advanced / Signature Reduction-OpSec in the Cyberspace Domain This is our most popular course. We offer it as live-instructor at customer's location and San Diego, CA. The course introduces students to privacy and risk management practices in the cyberspace domain; securing cybertechnology such as Ipads, smartphones, laptops, and desktops to keep these devices from broadcasting the user’s activities and patterns of interaction in the cyberspace domain; understanding social engineering methods and awareness on how to prevent becoming the victim of a phishing and/or social engineering attempt; best practices for interacting with social media platforms; and best practices to surf the World Wide Web without leaving footprints that can be used to compromise your private life and your enterprise. The course also addresses the ethical and legal aspects associated with activities conducted in the cyberspace domain. |
Open Source Collection and Analysis (OSINT / Competitive Intelligence)
Serious collection of cyber intelligence goes beyond just using Google. In this course, students learn techniques and tools, including the dark web, to collect accurate information in a timely manner. Social Network Theory Collection and Analysis Students learn the principles of social network theory to identify the three elements that really matter in any social network; as well as methods and tools for proper collection and analysis. Structured Analytic Techniques Students learn different thinking techniques that help remove pre-conceptions that clutter intelligence analysis and decision-making in any discipline. Network Defense and Offense This course prepares students seeking certifications such as Certified Ethical Hacker (CEH). Contact us to schedule a session |
Testimonials
"While at the FBI National Academy, I had the opportunity to learn Open Source Intelligence skills from Cecilia. Her specific class was one of the most interesting subjects taught in the intelligence curriculum. I was able to start using some of these skills immediately in my day to day work. She is a great instructor." --Layne Barnum, Public Safety "Cecilia is an absolute consummate professional both as an instructor in her on-line protection / risk management class, as well as her business as an intelligence analyst / private investigator at Meta Enterprises. She knows the cyber Intel business well and communicates that in ways that her students can easily grasp. A pleasure to work with AND she gets results too!" --Mike Davis, Director, IT Security (CISO) at American Bureau of Shipping |
All course purchases are final. Once the course is booked and travel reservations made, the course is non-refundable. It could be scheduled to a later date (client is responsible to purchasing additional travel arrangements).