Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

CSFI Certified Collections Analyst

Learn how to conduct collection operations, enable collections to support cybersecurity efforts, and use collection activities to support decision making within organizational tiers.

GK# 5967

Course Overview

TOP

This course provides a basic understanding of collection operations to support organizational missions, decision-making, and posturing organizations to discover and defend against cybersecurity threats. Emphasis is placed on collection methodologies, information sharing, collaboration, and tailoring of intelligence products. The course consists of presentations, exercises, and virtual network activities. At the conclusion of the course you will have a fundamental understanding of how to conduct collection operations, enable collections to support cybersecurity efforts, and use collection activities to support decision making within organizational tiers.

In the hands-on lab, you will be presented with a scenario that incorporates all previous instruction topics and exercises to develop a collections plan, cyber threat assessment, as well as to implement collection methods and develop briefing products.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Collections from public domain sources
  • Intent driven collections operations
  • Allocation and guidance for collection resource usage
  • Intelligence cycle activities
  • Intelligence product tailoring
  • Network activities collections
  • Collections feed into decision making
  • Collect and process information to support intelligence efforts
  • Develop and tailor cyberspace intelligence products to multiple levels of leadership
  • Assess adversarial intent from collected information and intelligence
  • Develop cyberspace collections plans to support intelligence and operations requirements

Outline

TOP
Viewing outline for:

Classroom Live Outline

1. Intelligence and Collections

  • Differences between intelligence and information
  • Intelligence cycle
  • Intelligence planning and direction

2. Public Collection

  • Push and pull collections
  • Intent driven collections

3. Collection Analysis

  • Collection screening
  • Collection taxonomies
  • Multi-faceted taxonomy usage

4. Product Development

  • Product tailoring
  • Content presentation methods
  • Collaboration and information sharing 
  • Presentation examples
  • Describe the PBED framework
  • Consider ME3C-(PC)2 elements when planning
  • Discuss the requirements of a brief
  • Understand the format of a debrief

5. Intelligence Requirements

  • Information requirements
  • Resource allocation
  • Collection guidance implementation

6. Network Collection

  • Sensor usage
  • Network traffic capture
  • Network movements and detection methodologies

7. Network Collection Analysis

  • Traffic pattern analysis
  • Obfuscation and stealth detection
  • Understanding adversarial intent

8. Final Exercise: Hands-on Lab

Prerequisites

TOP

Who Should Attend

TOP
  • Anyone interested in the field of cyber warfare/cyber operations
  • Anyone looking to expand a cyber-security career
  • Military commanders
  • Information-operations officers
  • Information security/assurance professionals
  • Cybersecurity consultants
  • Cyber planners
  • Military members (J2, J3, J5, J6, J9)
  • Security analysts
  • Network-security engineers
  • Penetration testers
  • Auditors
  • Government officials
  • Security engineers

Follow-On Courses

TOP
Course Delivery

This course is available in the following formats:

Classroom Live

Receive face-to-face instruction at one of our training center locations.

Duration: 3 day

Request this course in a different delivery format.
Enroll