UMBC Training Centers logo

Counterintelligence for IT Professionals

 

Course Description | Outline | Cybersecurity Training | IT Training

Persistent Attack and Exploitation: Offense

 

Overview

Cyber technology advances have changed the world and the benefits to individuals, private industry, and nation states are expanding on a daily basis.  However, cyber technology creates unique vulnerabilities for both private and public sector users.  Cyber threats to individual privacy, global commerce, and national security are as rampant as they are diverse, dynamic and complex.  Cybersecurity seeks to meet this challenge by developing technical measures to detect and deter adversary activity.  Unfortunately, many cyber threats cannot be countered by technical defenses alone.  The Wikileaks release of U.S. diplomatic cables, the “Anonymous” hacking of Bank of America files, the conviction of former University of Tennessee Professor John Reece Roth for the illegal export of military research data, and the arrest of Jin Hanjuan for theft of Motorola trade secrets, are high profile examples of the crisis faced by cybersecurity professionals.  Insider threat, social engineering and other illicit, often difficult to detect, methods of collection and targeting require integrated solutions that take into account legal, economic, political, behavioral and social disciplines.

This course provides counterintelligence, competitive intelligence, and security awareness for cybersecurity professionals in both government and private industry.  Students will be provided an overview of the intelligence community and an introduction to counterintelligence. The course identifies threats to national security and private industry interests from foreign collectors, insiders, and various traditional and non-traditional sources.  Students are introduced to counterintelligence and law enforcement agencies with cybersecurity or cyber-counterintelligence missions and given tools and techniques for building effective relationships within those communities.  The course provides an in depth review of operations security practices to identify threats and vulnerabilities, assess risk, and employ countermeasures.  The course helps students understand the requirements for and value of reporting cyber incident information.

At the end of this course, students will gain an understanding of traditional espionage, economic espionage, trade secret theft, and related crimes.  Students will differentiate among traditional, non-traditional, and insider threats to national security and private industry and identify activities and behaviors indicative of illicit activity. Students will learn about the roles and responsibilities of cybersecurity professionals in preventing, detecting, and reporting illicit activity.  Students will learn to harness federal resources available to them and develop skills required to safeguard information systems at their organizations. 

Schedule

2 Days

Contact

E-mail info@umbctrainingcenters.com or call (443) 692-6599:
  • if you have any questions about this course,
  • to be notified when this course and any closely related courses are scheduled for open enrollment,
  • to request a quote for group training at your location or ours.