Live Webinar - Leveraging Red Hat OpenShift for a Multi-Cloud Strategy

closeClose

CSFI Certified Collections Analyst

Course Details
Code: 5967
Tuition (USD): $3,000.00 • Classroom (3 days)

This course provides a basic understanding of collection operations to support organizational missions, decision-making, and posturing organizations to discover and defend against cybersecurity threats. Emphasis is placed on collection methodologies, information sharing, collaboration, and tailoring of intelligence products. The course consists of presentations, exercises, and virtual network activities. At the conclusion of the course you will have a fundamental understanding of how to conduct collection operations, enable collections to support cybersecurity efforts, and use collection activities to support decision making within organizational tiers.

In the hands-on lab, you will be presented with a scenario that incorporates all previous instruction topics and exercises to develop a collections plan, cyber threat assessment, as well as to implement collection methods and develop briefing products.

Skills Gained

  • Collections from public domain sources
  • Intent driven collections operations
  • Allocation and guidance for collection resource usage
  • Intelligence cycle activities
  • Intelligence product tailoring
  • Network activities collections
  • Collections feed into decision making
  • Collect and process information to support intelligence efforts
  • Develop and tailor cyberspace intelligence products to multiple levels of leadership
  • Assess adversarial intent from collected information and intelligence
  • Develop cyberspace collections plans to support intelligence and operations requirements

Who Can Benefit

  • Anyone interested in the field of cyber warfare/cyber operations
  • Anyone looking to expand a cyber-security career
  • Military commanders
  • Information-operations officers
  • Information security/assurance professionals
  • Cybersecurity consultants
  • Cyber planners
  • Military members (J2, J3, J5, J6, J9)
  • Security analysts
  • Network-security engineers
  • Penetration testers
  • Auditors
  • Government officials
  • Security engineers