Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Skill Problem Solving Big Picture/Summarization/Synthesis Scope Management Collection Management Open Source Data Technical Writing Writing for Leadership Conflict Resolution Public Speaking Penetration Testing Social Engineering Wireless Networks Vulnerability Assessments Cryptology Technical Architecture Network Defense Incident Response Networks & Networking Programming Data Mining CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.15
Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Skill Problem Solving Big Picture/Summarization/Synthesis Scope Management Collection Management Open Source Data Technical Writing Writing for Leadership Conflict Resolution Public Speaking Penetration Testing Social Engineering Wireless Networks Vulnerability Assessments Cryptology Technical Architecture Network Defense Incident Response Networks & Networking Programming Data Mining 6.16 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE
Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Skill Problem Definition Problem Solving Diversity of Perspective Big Picture/Summarization/Synthesis Scope Management Collection Management Open Source Data Defending Assessments Defending Assessments Technical Writing Writing for Leadership Debating Skills Knowing your Audience Conflict Resolution Attention to Detail Assimilate New Information Public Speaking Malware Penetration Testing Social Engineering Web Servers Wireless Networks Web Applications Vulnerability Assessments Cryptology Technical Architecture Information Architecture Network Defense Incident Response Networks & Networking Databases Programming Scripting Data Mining CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.17
Applicable Programs and Courses Courses Competency Skill Good Maybe Critical Thinking Problem Definition NONE NONE Data Collection & Examination Communication & Collaboration Problem Solving AMU - Intelligence Operations AMU - Analytics II AMU Threat Analysis MU - Analytic Techniques MU - Cyber Threat Analysis ASU - Advanced Intelligence analysis: Operating in Complex Environments Diversity of Perspective NONE NONE Big Picture/Summarization/Synthesis ASU - Grand Strategy, Intelligence Analysis, and Rationality Scope Management HPU - Intelligence Team Management UM - Intelligence Management and Oversight UM - Intelligence Analysis: Consumers, Uses, and Issues UDM - NPS - Cyber Systems and Operations HPU - Open Source Intelligence MU - in Intelligence AMU - ASU - Introduction to HPU - Vetting UM - Intelligence Analysis: Consumers, Uses, and Issues UDM - NPS - Cyber Systems and Operations DC3 - Cyber Analyst Course UM - Library Research Skills DC3 - Cyber Analyst Course UM - Library Research Skills HPU - Open Source Intelligence MU - in Intelligence AMU - ASU - Introduction to HPU - Vetting Collection Management ISA - Intelligence Collection ASU - Intelligence Analysis and National Security Perspectives ISA - Cyber Collections HPU - Intelligence Operations HPU - Intelligence Collection HPU - Intelligence Practicum HPU - Recruitment Cycle HPU - All Source Intelligence NPS - Cyber Systems and Operations UM - Intelligence Collection: Sources and Challenges SN - Cyber Intelligence Training AMU - Collection Open Source Data HPU - Open Source Intelligence ISA - Cyber Collections AMU - SIGINT UM - Intelligence Collection: Sources and Challenges Defending Assessments NONE NONE Defending Assessments NONE NONE Technical Writing ERAU - Technical Report Writing HPU - Writing for Publication Writing for Leadership CMU - Professional Writing HPU - Writing for Publication ISA - Analyst Training: Writing, Analysis, and Preparing Briefings Debating Skills NONE NONE Knowing your Audience NONE NONE 6.18 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE
Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Conflict Resolution ISA - Intelligence Concepts for Cyber Conflict Attention to Detail NONE NONE Assimilate New Information NONE NONE Public Speaking ERAU - Speech UDM - Intelligence Acquisition: Debriefing and Interviewing Techniques CMU - Strategic Presentation Skills Malware NONE NONE HPU - Analytical Methods Penetration Testing NPS - Cyber Wargame: Blue Team CMU - Hacking Exposed Social Engineering NPS - Cyber Wargame: Red Team NPS - Network Operations DISA - Social Networking DISA - Phishing NIU - Social Networks and Intelligence Web Servers NONE NONE Wireless Networks UC - Telecommunications Forensics Web Applications NONE NONE UC - Principles of Cybersecurity NPS - Computer Architecture and HPU - Analytical methods Vulnerability Assessments NPS - Network Vulnerability Assessment and Risk Mitigation NPS - Network Operations Cryptology UP - Cryptography NPS - Network Security Technical Architecture UM - Cyberspace and Cybersecurity NPS - Cyber Communications Architectures NPS - Computer Architecture and NPS - Network Operations in a Contested Environment ISA - Cyberforce Superiority Information Architecture NONE NONE Network Defense Incident Response ISA - Cyberforce Superiority UC - Computer Forensics Investigations NPS - Network Operations Networks & Networking NPS - Communications Networks NPS - Internet Protocols NPS - Network Operations NPS - Network Operations in a Contested Environment NPS - Network Security UP - Network Security FSU - Networking Essentials UP - Principles of Cybersecurity NPS - Computer Architecture and Databases NONE NONE NPS - Network Vulnerability Assessment and Risk Mitigation UC - Principles of Cybersecurity UC - Telecommunications Forensics Programming UM - Cyberspace and Cybersecurity NPS - Computer Architecture and Scripting NONE NONE Data Mining CMU - Data Mining CMU - Business Intelligence and Data Mining NPS - Information Management for Cyber Operations UC - Critical Incident Command, Response, and All Hazards CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.19
Programs Reviewed School Name Course Name School Name Course Name American Military University (online) Strategic Intelligence Bellevue University (Nebraska) (continued) Political Islam and Terrorism Transnational Crime and Corruption Angelo State University Bellevue University (Nebraska) Collection Analytics II Intelligence Operations Threat Analysis SIGINT Cybercrime Analysis Cyber Ethics: Privacy and Intellectual Property Law, Ethics, and Cybersecurity Criminal Intel Analysis Intelligence Profiling Deception, Propaganda and Disinformation Counterintelligence Information Operations Intelligence Analysis and National Security Perspectives Grand Strategy, Intelligence Analysis, and Rationality Transformational Imperative: Reorganizing in a Multi-polar World Advanced Intelligence analysis: Operating in Complex Environments Practice of US Intelligence and National Security Introduction to Applied Statistics Intelligence Support to Policy Making: Impact of 9/11 Special Operations: Creating Strategic Intelligence Effects Cyber Arms Race and the Intelligence Policy Nexus Intelligence and Counter-Terrorism National Security, Transnational Interests Comparative Intelligence Cultures Post-Conflict Politics: Peacekeeping and Peacebuilding Green Security: Eco-conflict and its Challenges Army War College Carnegie Mellon University Analyzing Anti-Americanism Strategic Deterrence Cyberwar and Cyberdeterrence Democracy, Ethnicity, Development in Africa Democracy, Political Economy and Human Rights across Asia Democracy, Gender, Reform across the Middle East Comparative Foreign Policy Hard and Soft Power Deterring the Enemy Domestic and International Security Environments and the National Security System Contemporary Security Issues and national Security Policies and Strategies Geography and US National Security Decision Analysis for Senior Leaders Strategic Intelligence for Counterterrorism: Contemporary Threats to National Security Cyberwarfare Cyberspace Theory and Strategic Security Implications Business Intelligence and Data Mining Cybersecurity in Critical Infrastructure Protection Data Mining Decision Making Under Uncertainty Hacking Exposed Information Assurance Policy Information Security Risk Analysis Information Security: Comparison of US and European Policies Information Warfare Professional Writing Strategic Presentation Skills Terrorism Security and Intelligence 6.20 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE
School Name Course Name School Name Course Name Department of Defense Cyber Counterintelligence in Cyber Space Henley-Putnam University Leadership Analysis Crime Center (DC3) Phase 1 (continued) Political Analysis Cyber Analyst Course Introduction to Cyber Investigations Area Studies Analysis Extremist Organizations Embry-Riddle Aeronautical University Cybersecurity Introduction Technical Report Writing Speech Intelligence Technology Computer Forensics Business Information System Terrorism Group Dynamics Analyzing the Terrorist Mind Terrorism and Society Kidnapping Strategies Influence Warfare Advanced Consequence Management and Incident Command Ferris State University Principles of Information Security System Henley-Putnam University Computer Forensics All Things Digital Data and Intelligence Competitive Theory Organized Crime, Gang and Terrorist Organizations Risk Analysis and Strategy Networking Essentials Recruitment Cycle Cover Double Agents, Denial, Deception Analytical methods Computer Intrusion Defense Cyberterrorism, Cyberwarfare, Cybercrime Hostage Negotiation, Hostage Survival Stalking and Workplace Violence Advanced Threat Assessment Background Investigations Vehicular Security Building and Perimeter Security Explosives and Arson Security White Collar Crime Open Source Intelligence Surveillance and Counterserveillance Intelligence Operations Intelligence Practicum Intelligence Team management Secret Societies All Source Intelligence Intelligence Policy and Reform Intelligence Collection WMD Terrorism Counterespionage Vetting Counterterrorism Analysis Cults and Charismatic Leaders Advanced Domestic Terrorism Operational Concepts and Planning Case Studies in Covert Operations Strategic Intelligence Intelligence & Security Academy, LLC Writing for Publication National Security Policy Process History of US Intelligence Intro to US Intelligence Risk Awareness Intelligence Homeland Security Intelligence Intelligence Budget Process Intelligence Concepts for Cyber Conflict Cyber Collections Operational intelligence Counter Terrorism: Actionable Intelligence Analyst Training: Writing, Analysis, and Preparing Briefings Intelligence Collection Cyberforce Superiority Intelligence and the Law CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.21
School Name Course Name School Name Course Name Mercyhurst University in Intelligence Naval PostGraduate School (NPS) Cyber Communications Architectures Intelligence Theories and Applications Competitive Intelligence Law Enforcement Intelligence (continued) Network Operations Topics in Signals Operations Cyber Mission Planning Cyber Policy Strategy Intelligence Communications Contemporary Leadership for Intelligence Managing Strategic Intelligence Network Operations in a Contested Environment Information Management for Cyber Operations Analytical Techniques Cyber Threat Analysis Comparative History of Intelligence Evolution of Counterintelligence Intelligence to Support Targeting Strategic Business Intelligence Intelligence and the Constitution Analyzing Financial Crimes Nonproliferation Analysis National Security Studies in Terrorism Counterintelligence Events and Concepts Penn State Cyber Wargame: Blue Team Cyber Wargame: Red Team Cyber Systems and Operations Computer Architecture and Operating Systems Conflict and Cyberspace Computer Security Information Assurance: Secure Management of Systems Network Security Network Vulnerability Assessment and Risk Mitigation Computer Science National Intelligence University Intelligence, the Military, and Warfare Counterespionage and Policy Making Topics in Intelligence Strategic Crisis Exercise Information Power and National Security Propaganda, Persuasion and Influence Cyber Intelligence Economics Foreign Languages and Cultures Geography Information Sciences and Technology Political Science Psychology Sociology Information, People, and Technology Security and Risk Analysis Foreign Information and Cyber Strategies Cyber Threat Secure Ninja Threat of Terrorism and Crime Secure Ninja Cyber Intelligence Training Naval PostGraduate School (NPS) Social Networks and Intelligence Advanced Information Power Seminar Cyber Systems and Operations Communications Networks Internet Protocols Secure Ninja Cyber Counterintelligence Secure Ninja Introduction to Cyber Crime 6.22 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE
School Name Course Name School Name Course Name University of Detroit Mercy University of Pittsburgh Information Science Spatial Analysis and Mapping Cryptography Terrorism Human Information Processing Homeland Security and Threat Assessment Roots of 21st Century Conflict Intelligence Acquisition: Debriefing and Interviewing Techniques Policy Analysis and Strategy Creation Leadership and Behavior in Organizational Intelligence Interactive System Design Human Factors in Systems Information Security and Privacy Network Security Information Ethics Legal Issues in Information Handling Information Security Professionals University of Maryland Topics in Intelligence Seminar in Security Issues Organizational Theory Intercultural Communication and Leadership Utica College (online) System Administrator in Information Systems Security Information System Security Officer System Certifiers Principles of Cybersecurity Financial Decision Making for Managers Statistics for Managerial Decision Making Managing Intelligence Activities Intelligence Collection: Sources and Challenges Intelligence Analysis: Consumers, Uses, and Issues Cyber Intelligence Critical National Infrastructures and National Security Cybercrime Investigations Cyber Counterintelligence Domestic Terrorism and Extremist Groups Counterterrorism and Cyber Conflict Espionage and Counterintelligence Intelligence Led Enforcement Intelligence Management and Oversight Leadership Seminar DISA Critical Incident Command, Response, and All Hazards Computer Forensics Investigations Telecommunications Forensics Cyber Awareness Challenge Library Research Skills IC ISS Awareness Cyberspace and Cybersecurity Social Networking Human Aspects in Cybersecurity: Ethics, Legal Issues and Psychology Phishing National Cybersecurity Policy and Law Enterprise Cybersecurity Policy Global Cybersecurity CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.23