LinkedIn tracking pixel

Professional Courses in Cyber Intelligence

IWP Cyber Intelligence Initiative logoThe IWP Cyber Intelligence Initiative (Ci2) offers professional courses designed by business leaders and national security experts to help government and corporate executives better understand the intelligence and counterintelligence aspects of cyber security.

Artificial Intelligence

What are you doing to keep up with Artificial Intelligence (AI)? The development of technology is expanding faster than the policy to shape it. This course explores the current and future role of artificial intelligence as it applies to cyber strategy and national defense. It will enhance your understanding of how artificial intelligence and cyber tools will affect the global battlefield in the years to come.

Cyber Terrorism

This course is designed to provide national security and cyber intelligence professionals like you with an understanding of cyber terrorism. You will learn to dissect the motive, means, and opportunity for the use of cyber to commit crimes, cause terror, and undermine national security. You will also gain knowledge of cyber tactics, techniques, and procedures (TTPs) used by cyber criminals and cyber terrorists.

Cyber Critical Infrastructure

Inc. Magazine research showed that 73 percent of companies are not prepared for hackers. Learn what a successful Cyber Security program is from a people, process, and technology perspective to protect your organization. This course shows the relationship between technology, intelligence threat analysis, and cyber hygiene to address cyber security with a holistic, integrated, strategic approach. Such an integrated strategy maximizes the ability to ensure that your organization is well defended.

Cyber Intelligence for Insider Threats

Insider threats have increased 26 percent since 2016, and their annual cost currently is estimated to be $11.1 billion. Learn how hostile foreign intelligence agencies operate and discover the identification process, indicators, motives, methodologies, and mitigation techniques designed to establish a proactive defensive posture that is essential for an overall risk management program.

Cyber Intelligence and Statecraft

Are you prepared for the global strategic environment and its battlefields in cyberspace? This course equips you to conduct multi-dimensional analyses of aggressive actions by state actors, their proxies, and non-state actors. It then prepares you to develop solutions and policy options within the emerging, continually evolving threat landscape of cyber warfare.

Cyber Strategy Development

This course introduces the concepts and methods of strategic cyber planning and applying it and intelligence across diverse environments. It culminates with each student producing a cyber strategy for an organization of their choosing. This course will provide students with the ability to assess and develop cyber strategies.

Cyber War, Hybrid War, and the International Law of Conflict

If you want to address the pressing questions of international law as it relates to cyber security, look no further. This course will examine the impact of international legal principles of Russian, Chinese, North Korean, and U.S. cyber operations (including offensive operations) and national security policy. You will be challenged to grapple with defining standards for the behavior of states in cyberspace – particularly concerning espionage and financial crime – that are in line with international law.

Enterprise Threat Modeling

This course will examine the concepts, techniques and primary goals of threat modeling. The course will introduce the value of techniques and strategies within threat modeling and will complete an exercise to understand and implement a threat model based on the data and information collected.  Threat models and techniques that will be introduced include; understanding the goals and strategic perspective in using threat models on an Enterprise System, a basic conceptual understanding of cybersecurity and data protection, a general understanding of the impact of data compromise from a statecraft and/or global perspective, and the primary goals of threat modeling.

Legal Dimension of Russian-U.S. Interactions in Cyberspace

Russia’s aggressive cyber operations against Georgia, Ukraine, and many NATO states, present novel legal, practical, and political challenges.  Some analysts have described Russian cyber operations as an attempt to operate in the gray zone.  Others believe that offensive cyber operations have fundamentally changed the nature of international ‘armed’ conflict and needs new legal norms.

While there is general agreement that long-standing International legal principles and norms of armed conflict survive technological change, there is not a consensus among experts about how these rules should apply to cyber operations.  The NATO Cooperative Cyber Defense Center of Excellence’s “Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations” offers the best ‘baseline’ for evaluating the behavior of states in cyberspace.  

Although the team of experts who developed the Tallinn Manual produces a set of 156 ‘black letter’ rules, their opinions diverged in many critical areas about how these rules were to operate in practice, particularly when non-state actors are involved.  This absence of consensus is evident in the lengthy commentaries following individual rules.

This course will examine the impact of international legal principles and norms on Russian and U.S. decisionmaker’s cyber operations and national security policy.  It will consider the need for refinement of the international law of armed conflict and international humanitarian law to better reflect current activities of state and non-state actors in the cyber domain, particularly concerning espionage, the commission of financial crime and the role of non-state actors.

Technology Underpinning Cyber Intelligence

This course introduces the main principles of cryptography which undergird the technology needed for cyber intelligence. It, then, addresses the major technical pillars that rest on this foundation, including financial technology, big data, and machine learning. Finally, it will cover digital currencies, digital ledgers, viruses, malware, and automation. All of this will be tied into an overview of the cyber intelligence industry, and how the major public and private players interact to develop defensive capabilities.

Vital Cyber Intelligence Analysis Skills

Learn the fundamentals of intelligence analysis and apply those critical skills to the cyber domain. You will explore the intelligence cycle, OODA loop, different methodologies, probability rationale, structured analytic techniques, and predictive intelligence writing and briefing.

Meet our Instructors Request more information