The Certified Intelligence Analyst – Cyber Intelligence Tradecraft training course follows the iterative processes of the intelligence lifecycle while covering non-inclusively. This course follows the:
International Association for Intelligence Education Standards for Intelligence Analyst Initial Training
incorporating intelligence community member validated content and hands-on experience in the cyber environment since 2004.
I. Introduction to Intelligence
II. Critical Thinking
III. Analytic Writing
IV. Creative Thinking
V. Analytic Briefing
VI. Structured Analytic Techniques.
VII. Analytic Issues
VIII. Argument Mapping
IX. Case Studies
Professional Head of Intelligence Assessment – PHIA:
As an analyst the framework will:
- help you articulate your current skill levels, using language that is recognized across the intelligence assessment community.
- help you identify learning and development gaps.
- support you if you wish to move between intelligence assessment organisations more easily.
As a line manager/team leader of analysts it will:
- help you recruit analysts more effectively.
- facilitate career development conversations.
- enable the increasing professionalization of your team.
This course is unique and innovative providing students with academic understanding, live case studies, and a course that drives practical over memorization for a test.
Latest student testimonial:
“With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state-of-the-art concepts and applied them to real-world scenarios establishing a solid understanding of utilizing these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine-tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional.”
Lecture, Hands-on, Apprenticeship, in-class exercises, student presentations covering structured analytic techniques, analysis of competing hypotheses, analytic writing and deliver, analytic products, templates, course material—40 CPEs
Target audience (who should attend):
–Intelligence analysts, all-source intelligence analysts, open-source intelligence collectors, researchers, cyber risk management professionals, incident response leadership, security operations leadership, CISO, CIO, students, cybercrime investigators, analytic report writers, recipients of internal and external intelligence (critical), curious professionals wishing to learn cyber intelligence tradecraft and intelligence strategies.
Requirements (knowledge pre-requisites)
Students should
-be familiar with Internet browsers, Office 365, general intelligence concepts
Hardware/Software Requirements
Students should have
-Laptop with administrative access, 8GB RAM, 100GB free hard drive space, Windows operating system works best but Mac with a VM for Windows works as well
You must be logged in to post a comment.