Training

Tech-Enhanced Training for Digital Signature Management​

The Practical Skills & Hands-On Instruction You Need to Manage Your Digital Signature

Let the Numbers Speak

0 +
Years In Service
0
Courses Offered Annually
0 +
Students Served Last Year

POLAR Training Series​​

Ubiquitous Technical Surveillance (UTS) is an ever-growing and constantly changing threat to business and government organizations.

Ridgeline training gives our clients the knowledge and tools they need to meet this threat head-on. Whether you’re searching for a foundational course on the basics of UTS or advanced training and exercise support tailored to your mission, there’s a course for you.

Our instructors are subject matter experts with practical, in-the-field experience on a broad range of UTS and Digital Signature Management topics. We’ve developed a comprehensive curriculum to meet our customers exactly where they are.

Ridgeline offers a deep catalog of UTS and Digital Signature Management courses. The POLAR Training Series is one of our most popular. POLAR stands for Pattern of Life Anomaly Response, the model we use for assessing the UTS threat landscape.

Ridgeline’s flagship training series helps our customers understand their digital signature, make better operational decisions, and use technology effectively in UTS environments.

Our Micro Mitigation Modules (M3) are one-day courses designed to hone participants’ skills on a specific topic, technique, or type of technology. The courses supplement Ridgeline’s POLAR education series, offering practical deep dives into key data privacy mitigation areas. M3 course topics are updated frequently to address our clients’ most pressing challenges. 

Ridgeline’s 100-level POLAR courses and our M3 courses are offered on both a per-seat enrollment basis, in addition to on-contract course purchases. Enrollment in Ridgeline’s training on a per-seat basis is currently limited to U.S. Government-sponsored personnel and contractors holding active security clearances.

We're the only company to provide hands-on, tech-enhanced training and advisory services on all aspects of UTS and Digital Signature Management

POLAR 100

Risk Management

A foundational course on UTS threat vectors that helps participants assess their current posture and identify UTS risks. During this course, participants obtain a conceptual and practical understanding of UTS and Ubiquitous Data Collection (UDC) through case studies and scenario-based discussions. This course is appropriate for participants new to UTS concepts or those needing to integrate a UTS mindset into their core duties.

POLAR 100 is offered on a per-seat basis or by purchasing an entire course.

Circular certification badge that says Polar Certified - Management with a Ridgeline logo and circuitboard pattern in the center

POLAR 101

Insights

A hands-on introduction to managing digital signatures using Ridgeline tech to visualize UTS threats. Participants develop baseline skills to mitigate UTS risks at home and abroad. Participants learn smart device fundamentals and essential strategies for managing data at rest and in transit. Insights addresses common use cases, including managing technology at home, work travel to sensitive sites, and international travel.

POLAR 101 is offered on a per-seat basis or by purchasing an entire course.

Circular certification badge that says Polar Certified - Foundational with a Ridgeline logo and circuitboard pattern in the center

POLAR 201

Applications

Applications is a five-day advanced digital signature management course tailored to your mission. The course begins with an in-depth study of online and electronic UTS threat vectors. Students then work through a series of practical and field exercises using tactics and technology that mirror their mission in a UTS environment simulated through our Vision product. Ridgeline instructors guide students through planning, preparation, and execution. They also provide actionable feedback using data collection and analytics.

  • Length: 5 Days
  • Delivery Methods: Lecture, discussion, guided demonstration, tech-enhanced hands-on exercises
POLAR 201 is not currently offered on a per-seat basis. Contact us for info about purchasing this course.
 

POLAR 301

Capstone

This five-day combined training and practical exercise course guides students through planning and mission execution in a UTS environment. Each Capstone scenario is tailored to our customer’s mission. Instructors leverage Ridgeline’s Vision product to give real-time feedback throughout the event and detailed after action reviews.

  • Length: 5 Days
  • Delivery Methods: Tech-enhanced, hands-on exercises, SME guidance and review

POLAR 301 is not currently offered on a per-seat basis. Contact us for more info about purchasing this course.

POLAR-EXEC

Executive Seminar

A seminar that introduces senior leadership to UTS threats and provides best practices for managing enterprise digital signatures. The fundamental concepts discussed equips leaders with the ability to assess current unit or office posture, identify practical steps to mitigate UTS risks, and shape future policy and resource decisions.

POLAR Exec is offered on a per-seat basis or by purchasing an entire course.

POLAR

Labs

A POLAR Lab offers a three- or five-day period of experimentation in a lab environment where students can practice tactics and techniques using Ridgeline’s Vision system while tapping into the unique expertise of our staff of instructors. These labs are offered as a stand-alone course, or as an add-on to POLAR 101, 201, or 301. Students receive real-time feedback from SMEs and visualize UTS threats using Ridgeline technology. 

POLAR Labs is not currently offered on a per-seat basis. Contact us for info about purchasing this class.

MICRO MITIGATION MODULE (M3)

Travel Router for General Data Protection

Participants use knowledge of basic network components and a GL.iNet travel router to mitigate data leakage while testing configured devices and assessing the efficacy of security protocols.
Take-home: GL.iNet travel router, 1-year VPN subscription, and associated software

M3 Course scheduling is flexible and driven by customer interest.

MICRO MITIGATION MODULE (M3)

Travel Router for Executive Data Protection

Participants determine primary threats to sensitive communications and configure a GL.iNet travel router to limit data leakage. Participants then test the efficacy of implemented security protocols.


Take-home: GL.iNet travel router, 1-year VPN subscription, and associated software

M3 course scheduling is flexible and driven by customer interest.

MICRO MITIGATION MODULE (M3)

Travel Router as a Hotspot

Participants determine the primary threats to online communications and configure a GL.iNet travel router to protect online cellular data. Participants then test the efficacy of implemented security measures.

Take-home: GL.iNet Mudi v2 travel router, VPN subscription, and associated hardware

M3 course scheduling is flexible and driven by customer interest.

MICRO MITIGATION MODULE (M3)

Raspberry Pi Hotspot Build

Using open source software, participants build their own working travel router with cellular modem. Participants then test their routers on a live cellular network.

Take-home: Raspberry Pi with cellular hat, VPN subscription, and associated software

M3 course scheduling is flexible and driven by customer interest.

MICRO MITIGATION MODULE (M3)

Virtual Machines

Participants work with Virtual Machines (VMs) to gain hands-on experience and determine how to use VMs to meet operational goals. Participants will configure network connectivity and device settings to optimize the use of VMs in various scenarios.

Take-home: External SSD and associated software

M3 course scheduling is flexible and driven by customer interest.

 

MICRO MITIGATION MODULE (M3)

Secure Starlink

Participants are introduced to Ridgeline’s POLAR theory and determine the primary threats to sensitive communications. Participants use Starlink hardware, a tethered travel router, and a VPN to establish secure online communications.
Take-home: GL.iNet travel router, VPN subscription, and Starlink Roam Standard kit

M3 course scheduling is flexible and driven by customer interest.

MICRO MITIGATION MODULE (M3)

Secure Travel Communications

In this two-day module, participants use mitigation techniques to enhance the security of their communications and online activity while using commercially available mobile devices. Participants pair devices with VPN-enabled Wi-Fi travel routers to minimize exposure of device-specific identifiers.
Take-home: GL.iNet travel router & VPN subscription

M3 course scheduling is flexible and driven by customer interest.

MICRO MITIGATION MODULE (M3)

Mesh Radio System

Participants create custom, secured networks using commercially available materials and the Wi-Fi HaLow communications protocol. 
Take-home: Raspberry Pi with accessories & mesh radio

M3 course scheduling is flexible and driven by customer interest.

MICRO MITIGATION MODULE (M3)

Intro to Secure Open Source Research

Participants locate, analyze, and synthesize information about individuals and organizations using ethical and effective open source research techniques.
Take-home: USB, VPN subscription, & Open-Source Intelligence Techniques by Michael Bazzell

M3 course scheduling is flexible and driven by customer interest.

MICRO MITIGATION MODULE (M3)

Intro to Smart Cameras

Using Ridgeline’s AI-enabled camera lab, participants examine the latest commercially available AI security systems, explore and evaluate AI camera limitations, and assess camera-saturated environments for specific threats to personal privacy. 
Take-home: AI-mitigating equipment

M3 course scheduling is flexible and driven by customer interest.

MICRO MITIGATION MODULE (M3)

Custom-Build GPS

Using commercially available hardware and software, participants build a functioning personal GPS with screen readout.
Take-home: Raspberry Pi Zero with accessories

M3 course scheduling is flexible and driven by customer interest.

MICRO MITIGATION MODULE (M3)

Data Packet Capture Methods

Participants use secure packet capture (PCAP) across various network interfaces and observe how PCAP tools can develop analytical insights from data in transit.
Take-home: Ruggedized Raspberry Pi with accessories

M3 course scheduling is flexible and driven by customer interest.

MICRO MITIGATION MODULE (M3)

Intro to Artificial Intelligence

Participants learn best practices for protecting data privacy while using commercially available AI tools and effectively leveraging this tech when conducting sensitive research for mission planning.

M3 course scheduling is flexible and driven by customer interest.

Get Ridgeline's Full Course Catalog

Ridgeline offers courses on various other UTS and signature management topics. Request a complete list of Ridgeline's course offerings.

Scroll to Top