CSFI Certified Collections Analyst

This course provides a basic understanding of collection operations to support organizational missions, decision-making, and posturing organizations to discover and defend against cybersecurity threats. Emphasis is placed on collection methodologies, information sharing, collaboration, and tailoring of intelligence products. The course consists of presentations, exercises, and virtual network activities. At the conclusion of the course you will have a fundamental understanding of how to conduct collection operations, enable collections to support cybersecurity efforts, and use collection activities to support decision making within organizational tiers.

In the hands-on lab, you will be presented with a scenario that incorporates all previous instruction topics and exercises to develop a collections plan, cyber threat assessment, as well as to implement collection methods and develop briefing products.

    No classes are currenty scheduled for this course.

    Call (919) 283-1653 to get a class scheduled online or in your area!

1. Intelligence and Collections

  • Differences between intelligence and information
  • Intelligence cycle
  • Intelligence planning and direction

2. Public Collection

  • Push and pull collections
  • Intent driven collections

3. Collection Analysis

  • Collection screening
  • Collection taxonomies
  • Multi-faceted taxonomy usage

4. Product Development

  • Product tailoring
  • Content presentation methods
  • Collaboration and information sharing 
  • Presentation examples
  • Describe the PBED framework
  • Consider ME3C-(PC)2 elements when planning
  • Discuss the requirements of a brief
  • Understand the format of a debrief

5. Intelligence Requirements

  • Information requirements
  • Resource allocation
  • Collection guidance implementation

6. Network Collection

  • Sensor usage
  • Network traffic capture
  • Network movements and detection methodologies

7. Network Collection Analysis

  • Traffic pattern analysis
  • Obfuscation and stealth detection
  • Understanding adversarial intent

8. Final Exercise: Hands-on Lab

  • Collections from public domain sources
  • Intent driven collections operations
  • Allocation and guidance for collection resource usage
  • Intelligence cycle activities
  • Intelligence product tailoring
  • Network activities collections
  • Collections feed into decision making
  • Collect and process information to support intelligence efforts
  • Develop and tailor cyberspace intelligence products to multiple levels of leadership
  • Assess adversarial intent from collected information and intelligence
  • Develop cyberspace collections plans to support intelligence and operations requirements
  • Anyone interested in the field of cyber warfare/cyber operations
  • Anyone looking to expand a cyber-security career
  • Military commanders
  • Information-operations officers
  • Information security/assurance professionals
  • Cybersecurity consultants
  • Cyber planners
  • Military members (J2, J3, J5, J6, J9)
  • Security analysts
  • Network-security engineers
  • Penetration testers
  • Auditors
  • Government officials
  • Security engineers

Ready to Advance Your Career?

CONTACT US NOW!