Global Operations Support Training (GOST)


GOST is an immersive, four-day, forty-hour scenario-based course of instruction that significantly increases student’s ability to safely support operations overseas. GOST training consists of four focus areas:

Day 1 Electronic Data Protection: Device Security, Internet Security, Communications Security, Open Source Research, Pre-Departure Area Survey

Day 2 Travel Safety: Behavioral Dynamics, Customs & Immigration, Secondary Inspection, Intro to Counter-Elicitation

Day 3 Advanced Situational Awareness: Attention-Perception-Comprehension-Projection, Cultural & Environmental Context, Adaptive Decision-Making, Terrain Walk & Area Baselining

Day 4 Orientation to Surveillance Awareness: Introduction to Surveillance Awareness, Vehicle Ride Along, Foot-Borne Surveillance Exercise

The Penrose Corporation designed GOST specifically to address the training gap for military personnel supporting sensitive operations overseas. The training has also proven exceptionally valuable for special operations personnel of all skill levels, executives, commercial support personnel, journalists, and anyone traveling through unfamiliar environments.

After GOST, students will have the skills and confidence needed to complete their day-to-day tasks overseas while protecting the critical nature of their mission, their corporate assets, and even their families.

Along with an advanced skill set, students leave GOST training with the physical implements, software and texts needed to sustain their training.

Logistics:

·       Training will be in the Ballston Quarter of Arlington, Virginia.

·       Training is held from 8:00 AM to 6:00 PM daily, with working lunches (provided).

Technical requirements:

·       Students are required to bring a lap top for Day 1 of GOST.

·       Only the most basic computer skills are needed for training.

·       Windows or Mac operating systems only please, no Chromebooks or Linux.

·       It is recommended that students bring the laptop they actually travel with; students will install software and configure the computer for secure operation.

·       Students must have Admin access to their computers; this may mean using their personal laptop for the training, then working with their IT department after the training to configure company equipment.

Registration:

·       Registration is currently closed. Please contact us for future dates or to schedule a private course.

* Non-government personnel may be subject to a background check.

** Government contractors will be admitted on a case-by-case basis and will be required to sign non-disclosure and non-compete agreements.