Cyber Intelligence Training
This five-day course examines Sherman Kent’s Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students will be able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course. In addition, students will understand the use methods of only anonymity, the fundamentals behind cyber intelligence collection and analysis and how these current methods can be employed in their organizations to assist in online operational security and in their defense against adversaries. The course is a combination of lecture, hands-on and student deliverables seen by many as an apprenticeship.
Upon completion of the course, each student will be able to:
- Identify the differences and intersections between open source data, open source information and open source intelligence
- Understand the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course
- Understand the use of online anonymity
- Understand collection and analysis of online human intelligence, geospatial information, imagery intelligence, and cyber intelligence
- Understand the fundamentals behind cyber intelligence collection and analysis and how these current methods can be employed in their organizations for prevention
- Understand the basics of Analysis of Competing Hypotheses (ACH) tool and usage
- Gain the ability to use open source intelligence tools to target, collect, produce and analyze data points into actionable intelligence.
- Understand how to quickly examine the data for new targeting and potential immediate recommendations and/or opportunities
- Understand how to gather information based upon provided targets
- Understand how to use several OSINT tools for data collection
- Understand how to collect, product and analyze data that provides my organization with a valid view of its Cyber-OPSEC posture
- Understand what type of information my adversaries know about my organization and how students can use this to enhance organizational security postures and improve prevention through situational awareness
This class is for anyone wishing to learn about cyber intelligence concepts and methods using open source tools for operational security, infiltration, analysis, recommendations and opportunities presentations, that provide their organizations with an immediate understanding of their Internet attack surface. Students wishing to understand adversarial methods and concepts surrounding the virtual manifestation of the traditional intelligence tradecraft are urged to attend.