Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Skill Critical Thinking Problem Solving Big Picture/Summarization/Synthesis Scope Management Research Methodologies & Applications Skepticism/Validation/Verification Data Collection & Examination Research Methodologies & Applications Skepticism/Validation/Verification Collection Management Open Source Data Communication & Collaboration Technical Writing Writing for Leadership Conflict Resolution Public Speaking Technical Exploitation Penetration Testing Social Engineering Wireless Networks Operating Systems Information Security Vulnerability Assessments Cryptology Technical Architecture Network Defense Incident Response Computing Fundamentals Networks & Networking Operating Systems Programming Data Mining CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.15 Competency Skill Critical Thinking Problem Solving Big Picture/Summarization/Synthesis Scope Management Research Methodologies & Applications Skepticism/Validation/Verification Data Collection & Examination Research Methodologies & Applications Skepticism/Validation/Verification Collection Management Open Source Data Communication & Collaboration Technical Writing Writing for Leadership Conflict Resolution Public Speaking Technical Exploitation Penetration Testing Social Engineering Wireless Networks Operating Systems Information Security Vulnerability Assessments Cryptology Technical Architecture Network Defense Incident Response Computing Fundamentals Networks & Networking Operating Systems Programming Data Mining 6.16 White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Competency Skill Critical Thinking Problem Definition Problem Solving Diversity of Perspective Big Picture/Summarization/Synthesis Scope Management Research Methodologies & Applications Skepticism/Validation/Verification Data Collection & Examination Research Methodologies & Applications Skepticism/Validation/Verification Collection Management Open Source Data Defending Assessments Communication & Collaboration Defending Assessments Technical Writing Writing for Leadership Debating Skills Knowing your Audience Conflict Resolution Attention to Detail Assimilate New Information Public Speaking Technical Exploitation Malware Penetration Testing Social Engineering Web Servers Wireless Networks Web Applications Operating Systems Information Security Vulnerability Assessments Cryptology Technical Architecture Information Architecture Network Defense Incident Response Computing Fundamentals Networks & Networking Operating Systems Databases Programming Scripting Data Mining CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.17 Applicable Programs and Courses Courses Competency Skill Good Maybe Critical Thinking Problem Definition NONE NONE Problem Solving AMU - Intelligence Operations AMU - Analytics II AMU Threat Analysis MU - Analytic Techniques MU - Cyber Threat Analysis ASU - Advanced Intelligence analysis: Operating in Complex Environments Diversity of Perspective NONE NONE Big Picture/Summarization/Synthesis ASU - Grand Strategy, Intelligence Analysis, and Rationality Scope Management HPU - Intelligence Team Management UM - Intelligence Management and Oversight Research Methodologies & Applications UM - Intelligence Analysis: Consumers, Uses, and Issues DC3 - Cyber Analyst Course UDM - Research Methods UM - Library Research Skills NPS - Cyber Systems and Operations Research Methods HPU - Open Source Intelligence MU - Research Methods in Intelligence AMU - Research Methods ASU - Introduction to Research Methods Data Collection & Examination Skepticism/Validation/Verification HPU - Vetting Research Methodologies & Applications UM - Intelligence Analysis: Consumers, Uses, and Issues DC3 - Cyber Analyst Course UDM - Research Methods UM - Library Research Skills NPS - Cyber Systems and Operations Research Methods HPU - Open Source Intelligence MU - Research Methods in Intelligence AMU - Research Methods ASU - Introduction to Research Methods Skepticism/Validation/Verification HPU - Vetting Collection Management ISA - Intelligence Collection ASU - Intelligence Analysis and National Security Perspectives ISA - Cyber Collections HPU - Intelligence Operations HPU - Intelligence Collection HPU - Intelligence Practicum HPU - Recruitment Cycle HPU - All Source Intelligence NPS - Cyber Systems and Operations Research Methods UM - Intelligence Collection: Sources and Challenges SN - Cyber Intelligence Training AMU - Collection Open Source Data Communication & Collaboration HPU - Open Source Intelligence ISA - Cyber Collections AMU - SIGINT UM - Intelligence Collection: Sources and Challenges Defending Assessments NONE NONE Defending Assessments NONE NONE Technical Writing ERAU - Technical Report Writing HPU - Writing for Publication Writing for Leadership CMU - Professional Writing HPU - Writing for Publication ISA - Analyst Training: Writing, Analysis, and Preparing Briefings 6.18 Debating Skills NONE NONE Knowing your Audience NONE NONE White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Communication & Collaboration Technical Exploitation Conflict Resolution ISA - Intelligence Concepts for Cyber Conflict Attention to Detail NONE NONE Assimilate New Information NONE NONE Public Speaking ERAU - Speech UDM - Intelligence Acquisition: Debriefing and Interviewing Techniques CMU - Strategic Presentation Skills HPU - Analytical Methods Malware NONE NONE Penetration Testing NPS - Cyber Wargame: Blue Team CMU - Hacking Exposed NPS - Cyber Wargame: Red Team HPU - Analytical methods NPS - Network Operations Social Engineering DISA - Social Networking DISA - Phishing NIU - Social Networks and Intelligence Web Servers NONE Wireless Networks UC - Telecommunications Forensics Web Applications NONE Operating Systems UC - Principles of Cybersecurity NONE NONE NPS - Computer Architecture and Operating Systems Information Security Vulnerability Assessments NPS - Network Vulnerability Assessment and Risk Mitigation NPS - Network Operations Cryptology UP - Cryptography Technical Architecture UM - Cyberspace and Cybersecurity NPS - Network Security NPS - Cyber Communications Architectures NPS - Computer Architecture and Operating Systems NPS - Network Operations in a Contested Environment ISA - Cyberforce Superiority Information Architecture NONE Network Defense ISA - Cyberforce Superiority Incident Response UC - Computer Forensics Investigations NONE NPS - Network Operations Computing Fundamentals Networks & Networking NPS - Communications Networks NPS - Internet Protocols NPS - Network Operations NPS - Network Vulnerability Assessment and Risk Mitigation NPS - Network Operations in a Contested Environment UC - Principles of Cybersecurity NPS - Network Security UC - Telecommunications Forensics UP - Network Security FSU - Networking Essentials Operating Systems UP - Principles of Cybersecurity NPS - Computer Architecture and Operating Systems Databases NONE NONE Programming UM - Cyberspace and Cybersecurity NPS - Computer Architecture and Operating Systems Scripting NONE NONE Data Mining CMU - Data Mining CMU - Business Intelligence and Data Mining NPS - Information Management for Cyber Operations UC - Critical Incident Command, Response, and All Hazards CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.19 Programs Reviewed School Name Course Name American Military University (online) Research Methods Strategic Intelligence School Name Bellevue University (Nebraska) (continued) Analytics II Strategic Deterrence Intelligence Operations Cyberwar and Cyberdeterrence Threat Analysis Democracy, Ethnicity, Development in Africa Cybercrime Analysis Democracy, Political Economy and Human Rights across Asia Cyber Ethics: Privacy and Intellectual Property Democracy, Gender, Reform across the Middle East Law, Ethics, and Cybersecurity Comparative Foreign Policy Criminal Intel Analysis Hard and Soft Power Intelligence Profiling Deterring the Enemy Army War College Counterintelligence Intelligence Analysis and National Security Perspectives Geography and US National Security Grand Strategy, Intelligence Analysis, and Rationality Decision Analysis for Senior Leaders Strategic Intelligence for Counterterrorism: Contemporary Threats to National Security Transformational Imperative: Reorganizing in a Multi-polar World Advanced Intelligence analysis: Operating in Complex Environments Cyberwarfare Cyberspace Theory and Strategic Security Implications Practice of US Intelligence and National Security Introduction to Research Methods Applied Statistics Intelligence Support to Policy Making: Impact of 9/11 Special Operations: Creating Strategic Intelligence Effects Carnegie Mellon University Business Intelligence and Data Mining Cybersecurity in Critical Infrastructure Protection Data Mining Decision Making Under Uncertainty Cyber Arms Race and the Intelligence Policy Nexus Hacking Exposed Intelligence and Counter-Terrorism Information Security Risk Analysis National Security, Transnational Interests Information Security: Comparison of US and European Policies Comparative Intelligence Cultures Information Warfare Post-Conflict Politics: Peacekeeping and Peacebuilding Professional Writing Green Security: Eco-conflict and its Challenges White Paper – CITP Training and Education Domestic and International Security Environments and the National Security System Contemporary Security Issues and national Security Policies and Strategies Information Operations 6.20 Transnational Crime and Corruption Analyzing Anti-Americanism Deception, Propaganda and Disinformation Bellevue University (Nebraska) Political Islam and Terrorism Collection SIGINT Angelo State University Course Name Information Assurance Policy Strategic Presentation Skills Terrorism Security and Intelligence CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE School Name Department of Defense Cyber Crime Center (DC3) Course Name Counterintelligence in Cyber Space Phase 1 School Name Henley-Putnam University (continued) Cyber Analyst Course Terrorism Group Dynamics Analyzing the Terrorist Mind Terrorism and Society Speech Kidnapping Strategies Intelligence Technology Influence Warfare Computer Forensics Principles of Information Security Advanced Consequence Management and Incident Command System Computer Forensics Computer Intrusion Defense All Things Digital Cyberterrorism, Cyberwarfare, Cybercrime Business Information System Data and Intelligence Competitive Theory Hostage Negotiation, Hostage Survival Organized Crime, Gang and Terrorist Organizations Henley-Putnam University Political Analysis Extremist Organizations Cybersecurity Introduction Technical Report Writing Ferris State University Leadership Analysis Area Studies Analysis Introduction to Cyber Investigations Embry-Riddle Aeronautical University Course Name Stalking and Workplace Violence Risk Analysis and Strategy Advanced Threat Assessment Networking Essentials Background Investigations Recruitment Cycle Vehicular Security Cover Building and Perimeter Security Double Agents, Denial, Deception Explosives and Arson Security Analytical methods White Collar Crime Writing for Publication Open Source Intelligence Surveillance and Counterserveillance Intelligence Operations Intelligence Practicum Intelligence Team management Secret Societies All Source Intelligence Intelligence Policy and Reform Intelligence & Security Academy, LLC National Security Policy Process History of US Intelligence Intro to US Intelligence Risk Awareness Intelligence Homeland Security Intelligence Intelligence Budget Process Intelligence Collection Intelligence Concepts for Cyber Conflict WMD Terrorism Cyber Collections Counterespionage Operational intelligence Vetting Counter Terrorism: Actionable Intelligence Counterterrorism Analysis Cults and Charismatic Leaders Advanced Domestic Terrorism Operational Concepts and Planning Case Studies in Covert Operations Strategic Intelligence CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Analyst Training: Writing, Analysis, and Preparing Briefings Intelligence Collection Cyberforce Superiority Intelligence and the Law White Paper – CITP Training and Education 6.21 School Name Mercyhurst University Course Name Research Methods in Intelligence Intelligence Theories and Applications School Name Naval PostGraduate School (NPS) (continued) Network Operations Cyber Mission Planning Law Enforcement Intelligence Cyber Policy Strategy Intelligence Communications Network Operations in a Contested Environment Contemporary Leadership for Intelligence Managing Strategic Intelligence Information Management for Cyber Operations Analytical Techniques Cyber Wargame: Blue Team Cyber Threat Analysis Cyber Wargame: Red Team Comparative History of Intelligence Cyber Systems and Operations Research Methods Evolution of Counterintelligence Computer Architecture and Operating Systems Intelligence to Support Targeting Strategic Business Intelligence Conflict and Cyberspace Intelligence and the Constitution Computer Security Analyzing Financial Crimes Nonproliferation Analysis Information Assurance: Secure Management of Systems National Security Network Security Studies in Terrorism Network Vulnerability Assessment and Risk Mitigation Counterintelligence Events and Concepts Penn State Computer Science Economics Intelligence, the Military, and Warfare Foreign Languages and Cultures Counterespionage and Policy Making Geography Topics in Intelligence Information Sciences and Technology Strategic Crisis Exercise Political Science Information Power and National Security Psychology Sociology Propaganda, Persuasion and Influence Information, People, and Technology Cyber Intelligence Security and Risk Analysis Foreign Information and Cyber Strategies Threat of Terrorism and Crime Cyber Threat Social Networks and Intelligence Advanced Information Power Seminar Naval PostGraduate School (NPS) Cyber Communications Architectures Topics in Signals Operations Competitive Intelligence National Intelligence University Course Name Cyber Systems and Operations Secure Ninja Secure Ninja Cyber Intelligence Training Secure Ninja Cyber Counterintelligence Secure Ninja Introduction to Cyber Crime Communications Networks Internet Protocols 6.22 White Paper – CITP Training and Education CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE School Name University of Detroit Mercy Course Name Research Methods School Name University of Pittsburgh Information Science Spatial Analysis and Mapping Cryptography Terrorism Human Information Processing Homeland Security and Threat Assessment Interactive System Design Human Factors in Systems Roots of 21st Century Conflict Information Security and Privacy Intelligence Acquisition: Debriefing and Interviewing Techniques Network Security Information Ethics Policy Analysis and Strategy Creation Legal Issues in Information Handling Leadership and Behavior in Organizational Intelligence Information Security Professionals Topics in Intelligence System Administrator in Information Systems Security Seminar in Security Issues University of Maryland Course Name Information System Security Officer Organizational Theory Intercultural Communication and Leadership System Certifiers Utica College (online) Financial Decision Making for Managers Cyber Intelligence Critical National Infrastructures and National Security Statistics for Managerial Decision Making Cybercrime Investigations Managing Intelligence Activities Cyber Counterintelligence Intelligence Collection: Sources and Challenges Domestic Terrorism and Extremist Groups Intelligence Analysis: Consumers, Uses, and Issues Counterterrorism and Cyber Conflict Critical Incident Command, Response, and All Hazards Espionage and Counterintelligence Intelligence Led Enforcement Computer Forensics Investigations Intelligence Management and Oversight Leadership Seminar Principles of Cybersecurity Telecommunications Forensics DISA Cyber Awareness Challenge Library Research Skills IC ISS Awareness Cyberspace and Cybersecurity Social Networking Human Aspects in Cybersecurity: Ethics, Legal Issues and Psychology Phishing National Cybersecurity Policy and Law Enterprise Cybersecurity Policy Global Cybersecurity CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education 6.23