Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking



Similar documents
Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education

University of Maryland University College. American Military University. Henley-Putnam University

Bellevue University Cybersecurity Programs & Courses

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Certified Cyber Security Analyst VS-1160

SCHOOL OF GLOBAL STUDIES DEPARTMENT OF INTERNATIONAL RELATIONS. Taught Masters programmes

MA NATIONAL AND INTERNATIONAL SECURITY (TAUGHT IN BULGARIAN)

Cyber Adversary Characterization. Know thy enemy!

AT A HEARING ENTITLED THREATS TO THE HOMELAND

Bachelor s Degrees. Criminal Justice Courses. Communication Courses. Bachelor s Degrees

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Criminal Justice Courses

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

Michael Yakushev PIR-Center, Moscow (Russia)

How To Get A Masters Degree In Intelligence Analysis

El Camino College Homeland Security Spring 2016 Courses

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

TUSKEGEE CYBER SECURITY PATH FORWARD

DEPARTMENT OF CRIMINOLOGY AND CRIMINAL JUSTICE STUDIES

Defense Security Service

m a s t e r o f s c i e n c e i n

The main object of my research is :

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

The FBI and the Internet

Middle Class Economics: Cybersecurity Updated August 7, 2015

Guide to Graduate Programs. Master of Arts Degrees Certificates of Graduate Study

WRITTEN TESTIMONY OF

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Internet Safety and Security: Strategies for Building an Internet Safety Wall

CyberSecurity Solutions. Delivering

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Confrontation or Collaboration?

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Introduction to Cybersecurity Overview. October 2014

The Comprehensive National Cybersecurity Initiative

Secure Data Centers For America A SOLUTION TO

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

Actions and Recommendations (A/R) Summary

Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: Fall AY14)

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cybersecurity Strategic Talent Management. March, 2012

Department of Defense DIRECTIVE

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

Federal Bureau of Investigation

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Promoting a cyber security culture and demand compliance with minimum security standards;

National Initiative for Cyber Security Education

Cyber Diplomacy A New Component of Foreign Policy 6

GAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.

Legal Issues / Estonia Cyber Incident

Information Assurance Program at West Point

Executive Cyber Security Training. One Day Training Course

MI5. Careers Guide 2012/13. Owing to the sensitivity of our work, we do not publicly disclose the identities of our staff.

An Overview of Large US Military Cybersecurity Organizations

NATO & Cyber Conflict: Background & Challenges

The Human Factor of Cyber Crime and Cyber Security

The virtual battle. by Mark Smith. Special to INSCOM 4 INSCOM JOURNAL

U.S. DoD Physical Security Market

Counterintelligence Awareness Glossary

UN Emergency Summit on Cyber Security Topic Abstract

Privacy and Security in Healthcare

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CARVER+Shock Vulnerability Assessment Tool

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)

Tactical Range Facility. Criminal Justice. Sgt. Major James Massey Range

National Cyber Security Strategies: United States

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

Who Are The Enemies? What Can They Do?

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

Gregg Gerber. Strategic Engagement, Emerging Markets

CENTRE FOR STRATEGIC CYBERSPACE + SECURITY SCIENCE LEADERSHIP. RESEARCH. DEFENCE.

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

SECURITY. Risk & Compliance Services

Homeland Security Education: The Current State. The Naval Postgraduate School, Center for Homeland Defense and Security

THE WORLD IS MOVING FAST, SECURITY FASTER.

We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

The War on Terror in Classrooms and Clinics: An Inventory

InfoSec Academy Application & Secure Code Track

working group on foreign policy and grand strategy

GW Law Alumni Elective Courses Survey

ACADEMIC YEAR KING GRADUATE SCHOOL. MBA in BUSINESS MANAGEMENT

RECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Society, Law Enforcement and the Internet

How To Get A Security Degree In Australia

Transcription:

Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Skill Problem Solving Big Picture/Summarization/Synthesis Scope Management Collection Management Open Source Data Technical Writing Writing for Leadership Conflict Resolution Public Speaking Penetration Testing Social Engineering Wireless Networks Vulnerability Assessments Cryptology Technical Architecture Network Defense Incident Response Networks & Networking Programming Data Mining CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.15

Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Skill Problem Solving Big Picture/Summarization/Synthesis Scope Management Collection Management Open Source Data Technical Writing Writing for Leadership Conflict Resolution Public Speaking Penetration Testing Social Engineering Wireless Networks Vulnerability Assessments Cryptology Technical Architecture Network Defense Incident Response Networks & Networking Programming Data Mining 6.16 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE

Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Skill Problem Definition Problem Solving Diversity of Perspective Big Picture/Summarization/Synthesis Scope Management Collection Management Open Source Data Defending Assessments Defending Assessments Technical Writing Writing for Leadership Debating Skills Knowing your Audience Conflict Resolution Attention to Detail Assimilate New Information Public Speaking Malware Penetration Testing Social Engineering Web Servers Wireless Networks Web Applications Vulnerability Assessments Cryptology Technical Architecture Information Architecture Network Defense Incident Response Networks & Networking Databases Programming Scripting Data Mining CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.17

Applicable Programs and Courses Courses Competency Skill Good Maybe Critical Thinking Problem Definition NONE NONE Data Collection & Examination Communication & Collaboration Problem Solving AMU - Intelligence Operations AMU - Analytics II AMU Threat Analysis MU - Analytic Techniques MU - Cyber Threat Analysis ASU - Advanced Intelligence analysis: Operating in Complex Environments Diversity of Perspective NONE NONE Big Picture/Summarization/Synthesis ASU - Grand Strategy, Intelligence Analysis, and Rationality Scope Management HPU - Intelligence Team Management UM - Intelligence Management and Oversight UM - Intelligence Analysis: Consumers, Uses, and Issues UDM - NPS - Cyber Systems and Operations HPU - Open Source Intelligence MU - in Intelligence AMU - ASU - Introduction to HPU - Vetting UM - Intelligence Analysis: Consumers, Uses, and Issues UDM - NPS - Cyber Systems and Operations DC3 - Cyber Analyst Course UM - Library Research Skills DC3 - Cyber Analyst Course UM - Library Research Skills HPU - Open Source Intelligence MU - in Intelligence AMU - ASU - Introduction to HPU - Vetting Collection Management ISA - Intelligence Collection ASU - Intelligence Analysis and National Security Perspectives ISA - Cyber Collections HPU - Intelligence Operations HPU - Intelligence Collection HPU - Intelligence Practicum HPU - Recruitment Cycle HPU - All Source Intelligence NPS - Cyber Systems and Operations UM - Intelligence Collection: Sources and Challenges SN - Cyber Intelligence Training AMU - Collection Open Source Data HPU - Open Source Intelligence ISA - Cyber Collections AMU - SIGINT UM - Intelligence Collection: Sources and Challenges Defending Assessments NONE NONE Defending Assessments NONE NONE Technical Writing ERAU - Technical Report Writing HPU - Writing for Publication Writing for Leadership CMU - Professional Writing HPU - Writing for Publication ISA - Analyst Training: Writing, Analysis, and Preparing Briefings Debating Skills NONE NONE Knowing your Audience NONE NONE 6.18 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE

Communication & Collaboration Technical Exploitation Information Security Computing Fundamentals Conflict Resolution ISA - Intelligence Concepts for Cyber Conflict Attention to Detail NONE NONE Assimilate New Information NONE NONE Public Speaking ERAU - Speech UDM - Intelligence Acquisition: Debriefing and Interviewing Techniques CMU - Strategic Presentation Skills Malware NONE NONE HPU - Analytical Methods Penetration Testing NPS - Cyber Wargame: Blue Team CMU - Hacking Exposed Social Engineering NPS - Cyber Wargame: Red Team NPS - Network Operations DISA - Social Networking DISA - Phishing NIU - Social Networks and Intelligence Web Servers NONE NONE Wireless Networks UC - Telecommunications Forensics Web Applications NONE NONE UC - Principles of Cybersecurity NPS - Computer Architecture and HPU - Analytical methods Vulnerability Assessments NPS - Network Vulnerability Assessment and Risk Mitigation NPS - Network Operations Cryptology UP - Cryptography NPS - Network Security Technical Architecture UM - Cyberspace and Cybersecurity NPS - Cyber Communications Architectures NPS - Computer Architecture and NPS - Network Operations in a Contested Environment ISA - Cyberforce Superiority Information Architecture NONE NONE Network Defense Incident Response ISA - Cyberforce Superiority UC - Computer Forensics Investigations NPS - Network Operations Networks & Networking NPS - Communications Networks NPS - Internet Protocols NPS - Network Operations NPS - Network Operations in a Contested Environment NPS - Network Security UP - Network Security FSU - Networking Essentials UP - Principles of Cybersecurity NPS - Computer Architecture and Databases NONE NONE NPS - Network Vulnerability Assessment and Risk Mitigation UC - Principles of Cybersecurity UC - Telecommunications Forensics Programming UM - Cyberspace and Cybersecurity NPS - Computer Architecture and Scripting NONE NONE Data Mining CMU - Data Mining CMU - Business Intelligence and Data Mining NPS - Information Management for Cyber Operations UC - Critical Incident Command, Response, and All Hazards CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.19

Programs Reviewed School Name Course Name School Name Course Name American Military University (online) Strategic Intelligence Bellevue University (Nebraska) (continued) Political Islam and Terrorism Transnational Crime and Corruption Angelo State University Bellevue University (Nebraska) Collection Analytics II Intelligence Operations Threat Analysis SIGINT Cybercrime Analysis Cyber Ethics: Privacy and Intellectual Property Law, Ethics, and Cybersecurity Criminal Intel Analysis Intelligence Profiling Deception, Propaganda and Disinformation Counterintelligence Information Operations Intelligence Analysis and National Security Perspectives Grand Strategy, Intelligence Analysis, and Rationality Transformational Imperative: Reorganizing in a Multi-polar World Advanced Intelligence analysis: Operating in Complex Environments Practice of US Intelligence and National Security Introduction to Applied Statistics Intelligence Support to Policy Making: Impact of 9/11 Special Operations: Creating Strategic Intelligence Effects Cyber Arms Race and the Intelligence Policy Nexus Intelligence and Counter-Terrorism National Security, Transnational Interests Comparative Intelligence Cultures Post-Conflict Politics: Peacekeeping and Peacebuilding Green Security: Eco-conflict and its Challenges Army War College Carnegie Mellon University Analyzing Anti-Americanism Strategic Deterrence Cyberwar and Cyberdeterrence Democracy, Ethnicity, Development in Africa Democracy, Political Economy and Human Rights across Asia Democracy, Gender, Reform across the Middle East Comparative Foreign Policy Hard and Soft Power Deterring the Enemy Domestic and International Security Environments and the National Security System Contemporary Security Issues and national Security Policies and Strategies Geography and US National Security Decision Analysis for Senior Leaders Strategic Intelligence for Counterterrorism: Contemporary Threats to National Security Cyberwarfare Cyberspace Theory and Strategic Security Implications Business Intelligence and Data Mining Cybersecurity in Critical Infrastructure Protection Data Mining Decision Making Under Uncertainty Hacking Exposed Information Assurance Policy Information Security Risk Analysis Information Security: Comparison of US and European Policies Information Warfare Professional Writing Strategic Presentation Skills Terrorism Security and Intelligence 6.20 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE

School Name Course Name School Name Course Name Department of Defense Cyber Counterintelligence in Cyber Space Henley-Putnam University Leadership Analysis Crime Center (DC3) Phase 1 (continued) Political Analysis Cyber Analyst Course Introduction to Cyber Investigations Area Studies Analysis Extremist Organizations Embry-Riddle Aeronautical University Cybersecurity Introduction Technical Report Writing Speech Intelligence Technology Computer Forensics Business Information System Terrorism Group Dynamics Analyzing the Terrorist Mind Terrorism and Society Kidnapping Strategies Influence Warfare Advanced Consequence Management and Incident Command Ferris State University Principles of Information Security System Henley-Putnam University Computer Forensics All Things Digital Data and Intelligence Competitive Theory Organized Crime, Gang and Terrorist Organizations Risk Analysis and Strategy Networking Essentials Recruitment Cycle Cover Double Agents, Denial, Deception Analytical methods Computer Intrusion Defense Cyberterrorism, Cyberwarfare, Cybercrime Hostage Negotiation, Hostage Survival Stalking and Workplace Violence Advanced Threat Assessment Background Investigations Vehicular Security Building and Perimeter Security Explosives and Arson Security White Collar Crime Open Source Intelligence Surveillance and Counterserveillance Intelligence Operations Intelligence Practicum Intelligence Team management Secret Societies All Source Intelligence Intelligence Policy and Reform Intelligence Collection WMD Terrorism Counterespionage Vetting Counterterrorism Analysis Cults and Charismatic Leaders Advanced Domestic Terrorism Operational Concepts and Planning Case Studies in Covert Operations Strategic Intelligence Intelligence & Security Academy, LLC Writing for Publication National Security Policy Process History of US Intelligence Intro to US Intelligence Risk Awareness Intelligence Homeland Security Intelligence Intelligence Budget Process Intelligence Concepts for Cyber Conflict Cyber Collections Operational intelligence Counter Terrorism: Actionable Intelligence Analyst Training: Writing, Analysis, and Preparing Briefings Intelligence Collection Cyberforce Superiority Intelligence and the Law CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.21

School Name Course Name School Name Course Name Mercyhurst University in Intelligence Naval PostGraduate School (NPS) Cyber Communications Architectures Intelligence Theories and Applications Competitive Intelligence Law Enforcement Intelligence (continued) Network Operations Topics in Signals Operations Cyber Mission Planning Cyber Policy Strategy Intelligence Communications Contemporary Leadership for Intelligence Managing Strategic Intelligence Network Operations in a Contested Environment Information Management for Cyber Operations Analytical Techniques Cyber Threat Analysis Comparative History of Intelligence Evolution of Counterintelligence Intelligence to Support Targeting Strategic Business Intelligence Intelligence and the Constitution Analyzing Financial Crimes Nonproliferation Analysis National Security Studies in Terrorism Counterintelligence Events and Concepts Penn State Cyber Wargame: Blue Team Cyber Wargame: Red Team Cyber Systems and Operations Computer Architecture and Operating Systems Conflict and Cyberspace Computer Security Information Assurance: Secure Management of Systems Network Security Network Vulnerability Assessment and Risk Mitigation Computer Science National Intelligence University Intelligence, the Military, and Warfare Counterespionage and Policy Making Topics in Intelligence Strategic Crisis Exercise Information Power and National Security Propaganda, Persuasion and Influence Cyber Intelligence Economics Foreign Languages and Cultures Geography Information Sciences and Technology Political Science Psychology Sociology Information, People, and Technology Security and Risk Analysis Foreign Information and Cyber Strategies Cyber Threat Secure Ninja Threat of Terrorism and Crime Secure Ninja Cyber Intelligence Training Naval PostGraduate School (NPS) Social Networks and Intelligence Advanced Information Power Seminar Cyber Systems and Operations Communications Networks Internet Protocols Secure Ninja Cyber Counterintelligence Secure Ninja Introduction to Cyber Crime 6.22 White Paper CITP Training and Education CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE

School Name Course Name School Name Course Name University of Detroit Mercy University of Pittsburgh Information Science Spatial Analysis and Mapping Cryptography Terrorism Human Information Processing Homeland Security and Threat Assessment Roots of 21st Century Conflict Intelligence Acquisition: Debriefing and Interviewing Techniques Policy Analysis and Strategy Creation Leadership and Behavior in Organizational Intelligence Interactive System Design Human Factors in Systems Information Security and Privacy Network Security Information Ethics Legal Issues in Information Handling Information Security Professionals University of Maryland Topics in Intelligence Seminar in Security Issues Organizational Theory Intercultural Communication and Leadership Utica College (online) System Administrator in Information Systems Security Information System Security Officer System Certifiers Principles of Cybersecurity Financial Decision Making for Managers Statistics for Managerial Decision Making Managing Intelligence Activities Intelligence Collection: Sources and Challenges Intelligence Analysis: Consumers, Uses, and Issues Cyber Intelligence Critical National Infrastructures and National Security Cybercrime Investigations Cyber Counterintelligence Domestic Terrorism and Extremist Groups Counterterrorism and Cyber Conflict Espionage and Counterintelligence Intelligence Led Enforcement Intelligence Management and Oversight Leadership Seminar DISA Critical Incident Command, Response, and All Hazards Computer Forensics Investigations Telecommunications Forensics Cyber Awareness Challenge Library Research Skills IC ISS Awareness Cyberspace and Cybersecurity Social Networking Human Aspects in Cybersecurity: Ethics, Legal Issues and Psychology Phishing National Cybersecurity Policy and Law Enterprise Cybersecurity Policy Global Cybersecurity CARNEGIE MELLON UNIVERSITY SOFTWARE ENGINEERING INSTITUTE White Paper CITP Training and Education 6.23