# Counterintelligence for Information Security Assessment and Protection Course (Self-Paced)

Canonical URL: <https://www.graduateschool.edu/courses/counterintelligence-for-information-security-assessment-and-protection-course-self-paced>

## Overview

Gain an introduction to today’s threats (criminals, foreign intelligence services, terrorists, malicious code writers, hackers/hacktivists, and disgruntled employees) to sensitive and classified information, your employees, and your resources. Learn about the multifaceted threat that faces companies and agencies today, as well as tactics you can employ to combat it. Clearly understand the multifaceted threat to sensitive and classified information, resources, and personnel. Effectively articulate this threat to employees as part of your security education and training effort. This course is part of the Certified Government Auditor (CGA) program, [Level 1](/certificates/certified-government-auditor-level-i-2024-march-requirements) and [Level 2](/certificates/certified-master-government-auditor-level-ii-2024-may-requirements).

## What you'll learn

- Define the risks and threats associated with counterintelligence and information security.
- Describe the roles and responsibilities of counterintelligence security personnel and those charged with assessing and preventing risks associated with information.
- Identify the potential sources of domestic and foreign threats to information security.
- Explain the levels of information classification and required security.
- Recognize indicators and conditions of internal threats as well as methods used for information theft and exploitation.
- Apply countermeasures and controls to increase awareness, prevention, detection, and mitigation of threats.
- Develop and apply procedures for reacting to, recording, and reporting threats, suspicious activity, and actual breaches.

## Curriculum

#### Module 1: Counterintelligence

- Define counterintelligence and explain its role in information security
- Identify internal and external threats to cleared industries
- Discuss the 16 U.S. critical infrastructure sectors
- Apply the “Five D’s” of counterintelligence: deter, deceive, disrupt, deny, and defeat

#### Module 2: Who is the Threat and What Do They Want?

- Identify nation-states and technologies targeted for espionage
- Understand methods used to steal economic and defense secrets
- Explore real-world espionage cases and motivations
- Examine foreign intelligence services and their operations

#### Module 3: Domestic Terrorism and Domestic Violent Extremist (DVE) Groups

- Define domestic terrorism and categorize violent extremist groups
- Understand threat trends from racially motivated and anti-government actors
- Analyze legal definitions and reporting structures for DT threats

#### Module 4: Classified Information and Foreign Travel as a Clearance Holder

- Explain classification levels and handling protocols
- Describe SEAD 3 reporting requirements for foreign travel
- Understand Controlled Unclassified Information (CUI) and Five Eyes alliance

#### Module 5: The Cyber Threat and the Criminal/Terrorism Connection

- Identify cyber threats and the actors behind them
- Discuss emerging cyber espionage tactics and attack vectors
- Analyze the exploitation of mobile and social technologies

#### Module 6: Insider Threats

- Define insider threats and understand their motivations
- Review historical and recent insider espionage cases
- Learn indicators of espionage, financial distress, and misuse of IT resources

#### Module 7: Tools to Use in Counterintelligence

- Administer SF-312 agreements and conduct security training
- Use physical and IT security measures to detect threats
- Apply insider threat indicators and conduct risk assessments

## Pricing

**Tuition:** $1049
