This online course teaches, instructs, guides, and aids students in building a proper cyber intelligence program. The course is designed to guide organizations in their cyber and threat intelligence program builds through online lectures, demonstrations, and templates covering the full intelligence lifecycle at a minimum. We take students through the strategic planning process, goals and objectives creation, stakeholder analysis, adversary targeting, and threat matrices creation, priority intelligence requirements, collection planning, structured analytic technique usage, analysis, maturity assessments, SOP development, threat intelligence platform selection, analytic writing, and dissemination non-inclusively.
The program includes instructional videos tied to content with periodic direct access to instructors for client deliverable reviews. We supply templates and examples that you can use, change, or get ideas from. Artifacts specifically designed for past clients.
The peer-review process follows a standard cycle including comments, suggestions, recommendations, and examples of previously finished products. The program follows proven methods established over the years while creating intelligence programs. Clients move at a regular pace that corresponds with their internal schedules. We offer the program in different definitive sections to give students time to work artifacts, ideas, and the program with their stakeholders. The program also offers the standard Cyber Intelligence Tradecraft Certification training as an add-on.
That tradecraft follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training, intelligence community directives (ICDs), content from the Sherman Kent School for Intelligence Analysis and Mercyhurst University as well as 30+ years of boots on the ground experience. We also incorporate the NICE Framework as our courses are offered via US Government portals.