Course

Course Summary
Credit Type:
Course
ACE ID:
CDSE-0043
Organization's ID:
CI201.CU
Location:
Classroom-based
Length:
8.75 hours
Dates Offered:
Credit Recommendation & Competencies
Level Credits (SH) Subject
Upper-Division Baccalaureate 4 Strategic Security, Counter Terrorism, or Intelligence Studies
The credit recommendation in intelligence studies includes components found in a psychology minor.
Description

Objective:

The course objective is to develop a comprehensive understanding of counterintelligence awareness and reporting, insider threat awareness, the integration of counterintelligence into security programs, counterintelligence concerns in personnel security and foreign travel, research and technology protection, and threats to defense industry.

Learning Outcomes:

  • Identify key indicators of the Insider Threat
  • Recognize anomalies
  • Recognize the types of suspicious events and behaviors that should be reported and identify how to report them
  • Identify the purpose of and appropriate content for a CI Foreign Travel Briefing and create a briefing customized for the learner's organization using the course resources
  • Demonstrate comprehension of insider threat awareness and reporting requirements as outlined in the National Insider Threat Policy Minimum Standards for Insider Threat Programs
  • Identify key employee groups most likely to be targeted by an adversary attempting to gain information, their vulnerabilities, and kinds of contact likely to be experienced
  • Identify the relationship between CI and security
  • Identify the primary methods an adversary might use to target and collect information at your facility
  • Identify foreign collection attempts targeting U.S. critical technologies
  • Identify the key indicators of the six major collection methods, including unsolicited and direct requests, suspicious internet activity, solicitation and employment, foreign visits, targeting at conferences, conventions, and trade shows, and insider threat
  • Identify the role of threat awareness in protecting the Defense Industrial Base
  • Identify reporting requirements
  • Recognize potential espionage indicators
  • Identify key indicators of the cyber threat
  • Determine whether an email is suspicious based on warning signs and determine the correct action to take if the email is suspicious
  • Identify key indicators of Foreign Intelligence Entity threats
  • Identify ways to promote employee awareness and reporting of issues of CI concern
  • Identify the role of risk management in a security program
  • Identify how to use threat information in your security program
  • Recognize the elements of a successful CI program
  • Identify the assets, threats, and vulnerabilities to your facility's technology
  • Identify the technologies you have at your facility
  • Identify who might want to obtain each technology
  • Recognize the types of suspicious events and behaviors that should be reported and identify how to report them
  • Recognize suspicious behavior and activity associated with the insider threat
  • Identify countermeasures to safeguard against cyber threats
  • Recognize the types of suspicious cyber events and behaviors that should be reported and identify how to report them

General Topics:

  • Counterintelligence awareness and reporting for DoD Employees
  • Integrating CI and threat awareness into your security program
  • Sensitizing facility employees to CI concerns
  • The relationship between counterintelligence and security
  • Protecting your facility's technology
  • Thwarting the enemy
  • Insider threat awareness
  • Cybersecurity awareness
  • CI foreign travel briefing
  • Suspicious emails
  • Counterintelligence concerns for National Security Adjudicators
Instruction & Assessment

Instructional Strategies:

  • Computer Based Training

Methods of Assessment:

  • Examinations

Minimum Passing Score:

75%
Supplemental Materials