Cyber technology advances have changed the world and the benefits to individuals, private industry, and nation states are expanding on a daily basis. However, cyber technology creates unique vulnerabilities for both private and public sector users. Cyber threats to individual privacy, global commerce, and national security are as rampant as they are diverse, dynamic and complex. Cybersecurity seeks to meet this challenge by developing technical measures to detect and deter adversary activity. Unfortunately, many cyber threats cannot be countered by technical defenses alone. The Wikileaks release of U.S. diplomatic cables, the “Anonymous” hacking of Bank of America files, the conviction of former University of Tennessee Professor John Reece Roth for the illegal export of military research data, and the arrest of Jin Hanjuan for theft of Motorola trade secrets are high profile examples of the crisis faced by cybersecurity professionals. Insider threat, social engineering and other illicit, often difficult to detect, methods of collection and targeting require integrated solutions that take into account legal, economic, political, behavioral and social disciplines.
This course provides counterintelligence, competitive intelligence, and security awareness for cybersecurity professionals in both government and private industry. Students will be provided an overview of the intelligence community and an introduction to counterintelligence. The course identifies threats to national security and private industry interests from foreign collectors, insiders, and various traditional and non-traditional sources. Students are introduced to counterintelligence and law enforcement agencies with cybersecurity or cyber-counterintelligence missions and given tools and techniques for building effective relationships within those communities. The course provides an in depth review of operations security practices to identify threats and vulnerabilities, assess risk, and employ countermeasures. The course helps students understand the requirements for and value of reporting cyber incident information.
Who Should Take This Course
One year of IT work experience.
Why You Should Take This Course
At the end of this course, students will gain an understanding of traditional espionage, economic espionage, trade secret theft, and related crimes. Students will differentiate among traditional, non-traditional, and insider threats to national security and private industry and identify activities and behaviors indicative of illicit activity. Students will learn about the roles and responsibilities of cybersecurity professionals in preventing, detecting, and reporting illicit activity. Students will learn to harness federal resources available to them and develop skills required to safeguard information systems at their organizations.
Register 21 days before class start date and save 10%! Enter discount code EARLY10 during registration.
Register 21 days before class start date and save $250! Enter discount code EARLY250 during registration.
- CI 101
- Cyber CI in DoD and Law Enforcement
- Traditional and Non-Traditional Threats
- Insider Threat
- IT Threats
- Operations Security for the IT Professional
- Working with Law Enforcement, Security and Counterintelligence
- Incident Reporting
Is there a discount available for current students?
UMBC students and alumni, as well as students who have previously taken a public training course with UMBC Training Centers are eligible for a 10% discount, capped at $250. Please provide a copy of your UMBC student ID or an unofficial transcript or the name of the UMBC Training Centers course you have completed. Online courses are excluded from this offer.
What is the cancellation and refund policy?
Student will receive a refund of paid registration fees only if UMBC Training Centers receives a notice of cancellation at least 10 business days prior to the class start date for classes or the exam date for exams.