CCA Certifications
This course provides a basic understanding of collection operations to support organizational missions, decision-making, and posturing organizations to discover and defend against cyber security threats. Emphasis is placed on collection methodologies, information sharing, collaboration, and tailoring of intelligence products. The course consists of presentations, exercises, and virtual network activities. At the conclusion of the course you will have a fundamental understanding of how to conduct collection operations, enable collections to support cyber security efforts, and use collection activities to support decision making within organizational tiers.
Course Objectives
- Collect and process information to support intelligence efforts
- Develop and tailor cyberspace intelligence products to multiple levels of leadership
- Assess adversarial intent from collected information and intelligence
- Develop cyberspace collections plans to support intelligence and operations requirements
What Students Will Learn
- Collections from public domain sources
- Intent driven collections operations
- Allocation and guidance for collection resource usage
- Intelligence cycle activities
- Intelligence product tailoring
- Network activities collections
- Collections feed into decision making
Who Should Attend
- Anyone interested in the field of cyber warfare/cyber operations
- Anyone looking to expand a cyber-security career
- Military Commanders
- Information-Operations Officers
- Information Security/Assurance Professionals
- Cyber-Security Consultants
- Cyber Planners
- Military Members (J2, J3, J5, J6, J9)
- Security Analysts
- Network-Security Engineers
- Penetration Testers
- Auditors
- Government Officials
- Security Engineers
Prerequisites: Introduction to Cyber Warfare and Operations Design (recommended)
Follow-On Courses: CSFI-DCOE
Time Frame: 3 Days
Certification: CSFI-CCA
Course Outline
- Intelligence and Collections
- Differences between Intelligence and Information
- Intelligence Cycle
- Intelligence Planning and Direction
- Public Collection
- Push and pull collections
- Intent driven collections
- Collection Analysis
- Collection screening
- Collection taxonomies
- Multi-faceted taxonomy usage
- Product Development
- Product tailoring
- Content presentation methods
- Collaboration and information sharing
- Presentation examples
- Describe the PBED framework
- Consider the ME3C-(PC)2 elements when planning
- Discuss the requirements of a brief
- Understand the format of a brief
- Intelligence Requirements
- Information requirements
- Resource allocation
- Collection guidance implementation
- Network Collection
- Sensor usage
- Network traffic capture
- Network movements and detection methodologies
- Network Collection Analysis
- Traffic pattern analysis
- Obfuscation and stealth detection
- Understanding adversarial intent
- Final Exercise (Hands-on Lab)
- Students will be presented with a scenario, which incorporates all previous instruction topics and exercises to develop a collections plan, cyber threat assessment, implement collection methods, and develop briefing products