View Class Schedule 
► ProgramsOperational Cybersecurity

Operational Cybersecurity

Overview

Cyber technology advances have changed the world and the benefits to individuals, private industry, and nation states are expanding on a daily basis.  However, cyber technology creates unique vulnerabilities for both private and public sector users.  Cyber threats to individual privacy, global commerce, and national security are as rampant as they are diverse, dynamic and complex.  Cybersecurity seeks to meet this challenge by developing technical measures to detect and deter adversary activity.  Unfortunately, many cyber threats cannot be countered by technical defenses alone.  The Wikileaks release of U.S. diplomatic cables, the “Anonymous” hacking of Bank of America files, the conviction of former University of Tennessee Professor John Reece Roth for the illegal export of military research data, and the arrest of Jin Hanjuan for theft of Motorola trade secrets are high profile examples of the crisis faced by cybersecurity professionals.  Insider threat, social engineering and other illicit, often difficult to detect, methods of collection and targeting require integrated solutions that take into account legal, economic, political, behavioral and social disciplines.
 
This course provides counterintelligence, competitive intelligence, and security awareness for cybersecurity professionals in both government and private industry.  Students will be provided an overview of the intelligence community and an introduction to counterintelligence. The course identifies threats to national security and private industry interests from foreign collectors, insiders, and various traditional and non-traditional sources.  Students are introduced to counterintelligence and law enforcement agencies with cybersecurity or cyber-counterintelligence missions and given tools and techniques for building effective relationships within those communities.  The course provides an in depth review of operations security practices to identify threats and vulnerabilities, assess risk, and employ countermeasures.  The course helps students understand the requirements for and value of reporting cyber incident information.

At the end of this course, students will gain an understanding of traditional espionage, economic espionage, trade secret theft, and related crimes.  Students will differentiate among traditional, non-traditional, and insider threats to national security and private industry and identify activities and behaviors indicative of illicit activity. Students will learn about the roles and responsibilities of cybersecurity professionals in preventing, detecting, and reporting illicit activity.  Students will learn to harness federal resources available to them and develop skills required to safeguard information systems at their organizations. 

Topics

  • CI 101
  • Cyber CI in DoD and Law Enforcement
  • Traditional and Non-Traditional Threats
  • Insider Threat
  • IT Threats
  • Operations Security for the IT Professional
  • Working with Law Enforcement, Security and Counterintelligence
  • Incident Reporting

Prerequisites

One year of IT work experience.

Schedule

2 days

Group Training Available

UMBC Training Centers can deliver any of our courses in a group training environment at our facilities or yours. Group training can be an effective and economical method to quickly assure competency and consistency of knowledge and skills within an organization or department.