Certified Cyber CounterIntelligence Analyst
July 19-23 Fort Myers, Florida
Marriott Luminary Hotel
2200 Edwards Drive, Fort Myers, FL 33901
+1 833-918-1512
Normal Retail Price: $5299.00
Early bird registration: $3990.00
Cyber Infiltration | Propaganda and Fallacies | Cyber Psychological Operations |
Information Operations | Media Manipulation | Target analysis and manipulation |
Standard Glossary and Taxonomy | Charts, Graphs, Generators | Authoring of blogs and articles for influencing |
Mission-Based Counterintelligence | Deception Planning | Placement of specific concepts and phrases |
Counter Collection and Anticipation | Deception Chain | Cyber Persona Layer |
Denial and Deception | Types of Denial and Deception | Cyber Persona Development and Maintenance |
Counter-Denial and Deception | D&D Usage | Character archetypes |
Open Source Intelligence in Deception Operations | Perception as Deception | Establish the storyline |
VPNs and Burn Phones (US Only) | Avoid and Deny | Establish the plot synopsis |
Methods of Social Media Research | Shifting the Conversation | Story weaving and management |
Social media demographics | Forum Manipulation – COINTELPRO | Target profiles – dossiers |
Cyber Target Acquisition and Exploitation | Social Psychology | Target gap analysis |
Identify Active Adversary Campaigns | Persuasion | Clandestine Collection Operation |
Intent, Motivation, Goals, & Requirements | Differences in Culture/Diversity | Surveillance and Counter Surveillance |
Passive data collection | Hofstede Dimensions | CI Insider Threat, Investigations |
Campaign development | Reciprocity and Consistency | Guide to Underhanded Tactics |
Vectors of approach | Social validation | Rules for Radicals |
Courses of action | Liking, Authority, and Scarcity | Case Studies |
Elicitation and exfiltration | Rules of Disinformation | Team Presentations |
Memetic Engineering | Information Warfare | Content Creation |
Operational Security | MORE DETAILS BELOW |
This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome.