• No products in the cart.



WE, at ISA-ISRAEL, have trained in the last 32 years thousands of ELITE Protection operatives and Management personnel from more than 100 countries.

We are proud to realize that we have reached an internationally acclaimed status and we are considered as “one of the Best” institution for security qualification. Thus, we continue to enhance, improve and maximize our Graduates employment opportunities after qualifying with ISA – ISRAEL.

The Multinational aspect of our groups assist in networking an aspect that after graduation assists participants to manage and develop their professional careers individually.

 In order to give our trainees real “field” experience we run our courses in a unique and especial “moving training mode” .

Visiting and practicing “live” PROTECTION MISSION drills in various countries that helps much to reach expertise and familiarization with various aspects required from ELITE Protection Operatives in various environments & conditions .


Information, Intelligence, Data (Cyber), Knowledge

Gathering & Protection Methods


The ultimate qualification quest for Elite Protection personnel that wish to upgrade their skills for better:

  1. Providing the needed “Business intelligence” or   “Due diligence” to mitigate against  harmful business risks!
  2. Design of Protection systems and procedures for the prevention of Business Espionage, Theft of knowledge , Sabotage &  Cyber threats or  Terrorism
  3. Ensuring the Optimal organization’s assets security.




Information/intelligence is a “Progressive Force” in the business “Battlefield“.

The vision of information/intelligence is at our fingertips, at any given time or place, which both induces and slows down processes. It is the dream of each and every businessman and organization, whether public or institutional.

Everything begins when information/intelligence falls into the right or wrong hands, and thus influences the process of decision making.

Information/intelligence of this kind can lead to the rise or fall of corporations and organizations, may hinder business transactions, or alternatively, may give a critical advantage to the opposition and competition.

The Nightmare of any leader/manager/owner is the threat of infiltration of competitors from outside and from the circle close to you, into the home field – discussions, decisions, professional secrets, conversations, phone calls (linear, cellular, fax), bids, computer, vehicle, home and family.

The major and immediate advantage in the competitive intelligence world is the tight security of information/intelligence that prevails in your business or organization, resulting from the numerous and varying threats of which we are unaware in our everyday routine, and preventing tremendous damage to your business, organization and to you, the manager/owner, on a personal level.

Critical information/intelligence is worth a lot. Companies, institutions and organizations invest high budgets in two parallel channels:

  1. Keeping the existing information/intelligence from leaking out, thus preventing a significant advantage to the opposition.
  1. Obtaining information/intelligence in order to create an advantage over the competition/opposition, according to the universal saying:

“The best defense is offence”


Security in terms of protection and collection of information/intelligence is an array of protection circles. The core of this array is a combination of procedures, skills and advanced technologies. The outer circles must account for all aspects of physical security, including entry control, communications control and infrastructure (linear, data, cellular), computer systems and network infrastructure, departmentalization, employee control, guest control, internal and external maintenance control as well as issues such as organizational awareness and employment of tools for gathering information.

Your ability to recognize and define imminent threats to the assets you are protecting, and to decide on an appropriate operational response is essential.


True professional experience in the field of information/intelligence protection is both rare and unique. Our professional experience has been accumulated through years of service to various branches of the Israeli security establishment, including:

  • The Israeli Security Agency (Secret service “Shabac”)
  • The “Mossad”
  • Private businesses
  • Political organizations

Information Security Officer (ISO) – Qualification & certification

Having an ISO or the equivalent function in the organization has become a standard in business, government, and non-profit sectors. Throughout the world, a growing number of organizations have an ISO.

In corporations, the trend is for ISO’s to have a strong balance of business acumen and technology knowledge.

ISO’s are often in high demand and compensation.

The  Information Security Officer (ISO) is the executive within the organization responsible for developing and implementing the information, Intelligence, data (cyber), knowledge  Gathering actions & Protection  measures required.

It includes handling up to date security surveys, permanent threat assessments, set information security policy procedures, design and use technology to protect the enterprise’s communications, systems and assets from both internal and external threats.

The ISO directs the organization’s staff in identifying, developing, implementing, and maintaining processes across the enterprise to reduce information and information technology (IT) risks of any kind.

The ISO should prepare the organization’s staff in all levels to respond to incidents, establish appropriate standards and controls, manage security technologies, and direct the establishment and implementation of info security policies and procedures.

Typically, the ISO’s influence reaches the entire organization. Responsibilities may include, but not be limited to:


Session 1

Operative intelligence gathering methods & means

Module – “HUMINT – The Human Side of Intelligence”

This module will focus on the human factor in the collection of intelligence. It will cover both open and clandestine sources of information.

  • Open sources of information include newspapers, magazines, commercial news clipping services, court transcripts and filings, libraries, and public records.
  • Clandestine sources will analyze the history and current status of undercover agents, their recruitment, training, management, evaluation and control.
  • Before the gained information can be put to work for the organization’s relevant departments, verification is necessary to ascertain its accuracy.
  • Undercover activity: Building and adapting a cover, protection against undercover operators.
  • Operative actions: Covert searches + information gathering from target +obtaining documents
  • Recruitment and “running” of operatives: Finding, recruiting, and “running” the candidate.
  • How to prevent mishaps, pre-hiring checks.
  • Planting an operative: How it is done?

Module – Social engineering

Module – questioning, overt- covert, interrogation

Module – Surveillance

In this module the student will get acquainted with the techniques of physical and technical surveillance, for the purpose of obtaining information and/or evidence while conducting an investigation. The student will learn the difference between covert vs. overt surveillance and the means by which they are carried out depending upon the situation.

The module will cover the various methods used in the field as well as the applications of modern technology to expand the field agent’s reach.

  • Covert vs. overt surveillance
  • Types of surveillance
  • Preparation
  • Observation – day/night, quiet/crowded area, urban/suburban area
  • Surveillance on foot and per vehicle
  • Stationary surveillance and observation posts
  • Operational disguises and make-up
  • Communication – overt/covert, concealed on person or in vehicle, familiarity with equipment and its operation
  • Surveillance technology
  • Identification – by picture or description
  • Report writing

Module – Technical surveillance equipment &electronic countermeasures

In this module, different surveillance methods will be reviewed, including mechanical, electronic, visual and optical attacks. Mechanical attacks comprise everything from tape recording to physical capture of the information through oral or written form. Visual and optical attacks perhaps present the most common, least suspected form of intelligence collection.

  • Various countermeasures to RF and wave transmitters, including infrared, laser and air techniques for intelligence collection.
  • Detection, through systematic methods of conducting a physical search, electronic countermeasures and nullification including a practical understanding of how to conduct electronic sweeps to detect radio transmitters.
  • How to conduct a physical search.
  • Nullification of all surveillance methods.

Module – Phone line tapping countermeasures

  • Basic electricity and measurement, transmitters, overt and clandestine, telephone analyzers, and non-linear junction detectors.
  • Electronic switching systems, central office procedures, telephone testing, line tapping and tracing.
  • Telephone system design, security practices, and devices like scramblers.
  • Effective methods of nullification and all methods of telephonic intercepts.

Module  – Covert video technology and sting operations

This module will teach the student basic theory, application and the technology available for covert video surveillance.

  • Equipment, from light source to final monitoring, recording and printing for legal documentation.
  • Developments in video technology miniaturization and remote transmission, video motion detectors, VCRs and frame storage devices.
  • The practical application of video surveillance in retail stores as well as open-air surveillance.
  • “Sting operations”: how they are set up, site selection, security operatives, video camera selection and operation, identification of suspects, evidence preservation and documentation. (While the course is focused on criminal surveillance for the law enforcement community, there are numerous private security applications of sting operations).

Module – Electronic tracking technology

  • Tracking theory and its application in an urban environment, field-tracking problems, placement of transmitters, and re-acquisition of lost signals.
  • New technologies and their potential use in the security field such as satellite communication networks. Such technologies have potential use for tracking everything from stolen property to kidnap victims.

Module – Computer intelligence collection and security

Intelligence collection by computer is a rapidly expanding technology and service that is readily available to a growing number of private investigators, security officers and law enforcement investigators.

This module will cover many databases that can be accessed by computer, including: personal and business records, assets location and local address searches.

  • The essentials of computer security, including security software programs, operational security systems, protection of hardware devices, protection of software and data, transmission security, audit trails and standard practice procedures for computer systems.

Module Internal security

This module will cover issues including personnel, document and physical security.

  • Personnel security refers to the policies and procedures intended to determine that an individual is not currently a security risk, and are not likely to become one. A personnel security program is intended to prevent criminal activities by employees, espionage attempts by external intelligence forces and unintentional acts by employees that could lead to a compromising situation.
  • Document security, classification management, reproduction, disposal and transmission of sensitive or classified documents.
  • Physical security includes issues like access control, security patrols, personnel identification and visitor control, as well as methods of detecting unauthorized intrusion or activity, alarm systems and facility clearances.
  • Simulative drills and practice of information, Data and knowledge protection planning (field exercises)

Download Brochure

 “Fresh” Graduates of ISA – ISRAEL are directed to active  former graduates  that are
Established and operate Security firms worldwide and can offer
employment opportunities.

top to list

Course fees Includes:

  • The “SECURITY BIBLE” – ISA – ISRAEL’s ONLINE instruction materials of your program.
  • Attendance at the professional course.
  • All of the instruction equipment,  vehicles, weapons.
  • T-Shirts & special gifts.
  • Exploring the country while participating in the training.
  • Participation Certificate.

Course’s fees do not include flight & lodging during the training !!!

  top to list

Accommodation and Lodging

“Boarding Style Lodging”

  • ISA-Israel will book the accommodation automatically after receiving the registration form and payment from the candidate.
  • The trainee will cover his cost of accommodation in the hotel on his/her arrival to the training center.
  • A trainee needs to calculate 50-65 Euro for his/her own expenses for accommodation & 3 meals per day.

      top to list

Required Documents for PRACTICAL courses:

  • Your booking must be accompanied by a 100% payment in order to guarantee a spot in the course- if you are not able to make this payment now, do not place your registration form.

Please send via internet:

  1. Your registration form
  2. CV
  3. Copy of your Passport with your details on
  4. Full fee payment confirmation via bank transfer


No later than 45 days prior to the start of the course.  

ISA – ISRAEL’s specialized courses are heavily regulated by the Ministry of Defense and Homeland Security of Israel and other countries where we drill.

Participants must bring the original printed documents upon arriving  to ISA – ISRAEL the following documents in order to be accepted for the training:

  1. Health Certificate– stating that the candidate is physically and mentally fit for the training (from your personal Medic).
  2. Medical Insurance– each candidate must be covered by his own medical insurance throughout all course activities.
  3. Criminal Background Check/ Security Clearance- certifying that the candidate has no criminal record:

    Local authority permitted certifying that the candidate has no criminal record.
    One of these can also be accepted:
  • Active police or Military service or any government department employee identification card or official statements
  • A lawyer statement
  • Valid firearm license
  • Security company employee identification card

  Top to list

Prior to your practical training start !!! 

Upon receiving your registration form + the training fee:

  1. You will receive via  email from the ISA – ISRAEL office an access code to the “SECURITY BIBLE” of ISA – ISRAEL’s ONLINE instruction materials of your program that you should study and be prepared for theoretical exams   after  reaching us.
  2. You can receive an invitation letter if you need to apply for a visa to Israel.
  3.  2 weeks  prior to your course start, ISA-ISRAEL office will send you the  needed practical instructions and the training schedule for your arrival to our training site in Europe or Israel. 


Course Language- English

  • The course is taught in very basic English- there is NO need to speak fluently.

  Top to list

  Top to list


  • If you come from a country that requires a visa to enter Israel or Europe, then please complete your registration and participation payment 45 days prior to the training and apply to the relevant consulate in your country to start the visa process.
  • Consulate staff will require your employment status and organization, a clean criminal record, and the financial mans to pay for your stay during your visit in Israel or Europe.
  • Candidates that are required to apply for visa to join our courses in ISRAEL  or any other country where we  plan to enter for drilling 1-2 days during the course , be  advised to obtain a Multiple Entry Visa for your return to ISRAEL .


Recommended- Self Preparatory Training

  • From past experience, we believe that it is vital for the trainee who wishes to take part in our courses to partake in self preparatory training prior to his arrival to our course.

  Top to list

Physical Fitness Requirements for ISA’s Practical Courses (for graduating the course)

  1. Horizontal bars- 12 or more (Pull ups)
  2. 3000 meters- less than 17 minutes
  3. Parallel Bars- more then 16 (dips)
  4. Sit- ups, cross-legged against the wall, minimum 60 sit ups- less than one and a half minutes
  5. 400 meters- Maximum 75 seconds- running in pairs

  Top to list

Packing List for Practical Courses:

  • International driving license
  • 2 sets of “Tactical” pens , khaki, black, gray or dark blue- NOT camouflaged
  • 1 pair of running shoes
  • 2 sets of corporate casual wear (must have collar)
  • 1 sturdy belt for use of holsters and pistol
  • 1 pair of street shoes (no sneakers)
  • 2 rolls of ? inch medical tape
  • 1 set each ear (foamiest, not muffs) and eye protection
  • 2 knee protectors + 2 elbow protectors
  • 1 set of formal wear, dark colors (suit and tie)
  • 2 passport pictures
  • Digital camera- recommended
  • Laptop

Additional Packing List for High Risk  Protection Course Only

  • 1 Compass
  • 1 Flash Light
  • 2 long sleeve shirts suitable for desert environment

Packing List for the Management Specialization Course 

  • Casual Wear
  • 2 Passport photographs
  • Laptop
  • Digital Camera- recommended


  • Cancellations by ISA-Israel- we reserve the right to postpone, cancel, or alter the dates or provisions of a course and/or the venues of the course.
  • Cancellations by the client- in the event of a cancellation by the delegate, the delgate’s manager or any representative of the delegate’s organization, bookings will be transferred to the next available course, or to a future date that meets the candidate’s request.  A substitute delegate may be sent at no additional cost provided the substitute meets all necessary pre-entry conditions for that course.  If a booking is cancelled or transferred to a different course by the delegate or their representative:
    • Notice  Given: Less than 30 days,  you can transfer to another future date only if places are available.  Telephone cancellations are accepted but most be confirmed immediately in writing (by post, fax, or email). 
    • No refund after receive of the ISA – ISRAEL Instruction materials and manual.

  Top to list

Course Curriculum

No curriculum found !


    Contact Us
    Share if you like it:
    © 2018 - ISA Israel, All rights reserved. Web Design and Managment by VisiOne Design
    By using this site, you agree to our
    AlbanianArabicBulgarianChinese (Simplified)CzechDutchEnglishFrenchGermanGreekHindiHungarianItalianJapaneseKoreanMacedonianPolishPortugueseRomanianRussianSerbianSpanishThaiTurkishUkrainianVietnamese