Through our training programs, we help teams sharpen their natural thinking skills using relevant scenarios and their existing knowledge to catch threats to success before risks become real consequences.  We offer training programs for students and companies, and to clients / potential clients as company-sponsored outreach services to the community.  

Training Catalog

Gain Upgraded Ability to Recognize and Defend against Deceptions (GUARDD) for Employees 

This training focuses on practical in-person and online defense skills to protect personal and client data from deceptive scams, like phishing, social engineering, AI voice impersonations, oversharing exploitation, and phone-based cons.  Using active learning and real-world examples, participants identify and reason about common deceptions that target industry and clients, work habits that help or hinder defense against risks, such as data breaches or impersonation, and strategies in daily work for recognizing and defending against deceptions. Disciplined content production and publication are also covered, including methods to help your clients identify fake content claiming to be from you. 

GUARDD for Clients / Potential Clients 

This training grounds participants in awareness of unintended uses of digitally shared personal information and good cyber and phone habits to reduce risk exposure.  It teaches a defensive posture for interacting with others in person and over electronic services, such as email, text, phone calls, websites, and social media. Topics covered include access protection (to your accounts and information, like voice conversations and location); phone, web, email, text, and QR code scams; disciplined content consumption (such as TikTok videos and spotting bots and AI fakes) and avoiding oversharing on social media.  

Ethical Use of AI 

This training shows participants how to add the ethical use of AI to their personal and professional toolkits. It provides current examples of what AI is capable of and its applications in social and industrial settings.  Examples of deceptive applications are provided as preparation for exposure to duplicitous content.  Participants practice beneficial uses of AI as an assistant to human reasoning in a variety of personal, academic, and/or career application areas. Tips for using AI in ethical ways will be shared, showing how to use AI tools to assist with real-world tasks, from planning events to problem-solving. 

System Behavior Modeling 

Learn what system behavior is and why understanding how to actively shape it takes your business success to new heights.  Based on scientific and engineering principles without the tech jargon, this training teaches you how to formally express behavior rules that you are already familiar with from your industry and expose the consequences of those rules under different conditions. In learning behavior modeling using the Navy-developed Monterey Phoenix tool, you will pick up the basics of the user-friendly MP language and produce clear, precise flow diagrams to illustrate your mental model of a workflow in the language of your industry, to drive home points you want to make to your team members and decision- makers far better than a verbal or slide deck presentation can accomplish. 

Take our training in a format that is right for you. 

  • Workshops button 
  • Bootcamps button 
  • Internships button 
  • Online Courses button 

CTA: Connect with new potential customers via our outreach services!  Sponsor a Community Workshop.  Community Workshops: /community-workshops 

CTA: Need one-on-one attention to a current business or operational problem?  Inquire about our Expert Consulting in risk and opportunity identification through exhaustive behavior logic modeling. CTA promoting “Expert Consulting” – button brings up a form pop-up.  Form can be generalized for multiple types of inquiries.  Collect first and last name, email address, company name (optional), phone number (required if email left blank), Inquiry Type (Expert Consulting, Workshop, Bootcamp, Internship, Course), and a free text field.