Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Skill

advertisement
Appendix A: Gap Analysis Spreadsheet
Competency and Skill List
Competency
Skill
Critical Thinking
Problem Solving
Big Picture/Summarization/Synthesis
Scope Management
Research Methodologies & Applications
Skepticism/Validation/Verification
Data Collection & Examination
Research Methodologies & Applications
Skepticism/Validation/Verification
Collection Management
Open Source Data
Communication & Collaboration
Technical Writing
Writing for Leadership
Conflict Resolution
Public Speaking
Technical Exploitation
Penetration Testing
Social Engineering
Wireless Networks
Operating Systems
Information Security
Vulnerability Assessments
Cryptology
Technical Architecture
Network Defense
Incident Response
Computing Fundamentals
Networks & Networking
Operating Systems
Programming
Data Mining
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.15
Competency
Skill
Critical Thinking
Problem Solving
Big Picture/Summarization/Synthesis
Scope Management
Research Methodologies & Applications
Skepticism/Validation/Verification
Data Collection & Examination
Research Methodologies & Applications
Skepticism/Validation/Verification
Collection Management
Open Source Data
Communication & Collaboration
Technical Writing
Writing for Leadership
Conflict Resolution
Public Speaking
Technical Exploitation
Penetration Testing
Social Engineering
Wireless Networks
Operating Systems
Information Security
Vulnerability Assessments
Cryptology
Technical Architecture
Network Defense
Incident Response
Computing Fundamentals
Networks & Networking
Operating Systems
Programming
Data Mining
6.16
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Competency
Skill
Critical Thinking
Problem Definition
Problem Solving
Diversity of Perspective
Big Picture/Summarization/Synthesis
Scope Management
Research Methodologies & Applications
Skepticism/Validation/Verification
Data Collection & Examination
Research Methodologies & Applications
Skepticism/Validation/Verification
Collection Management
Open Source Data
Defending Assessments
Communication & Collaboration
Defending Assessments
Technical Writing
Writing for Leadership
Debating Skills
Knowing your Audience
Conflict Resolution
Attention to Detail
Assimilate New Information
Public Speaking
Technical Exploitation
Malware
Penetration Testing
Social Engineering
Web Servers
Wireless Networks
Web Applications
Operating Systems
Information Security
Vulnerability Assessments
Cryptology
Technical Architecture
Information Architecture
Network Defense
Incident Response
Computing Fundamentals
Networks & Networking
Operating Systems
Databases
Programming
Scripting
Data Mining
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.17
Applicable Programs and Courses
Courses
Competency
Skill
Good
Maybe
Critical Thinking
Problem Definition
NONE
NONE
Problem Solving
AMU - Intelligence Operations
AMU - Analytics II
AMU Threat Analysis
MU - Analytic Techniques
MU - Cyber Threat Analysis
ASU - Advanced Intelligence analysis:
Operating in Complex Environments
Diversity of Perspective
NONE
NONE
Big Picture/Summarization/Synthesis
ASU - Grand Strategy, Intelligence
Analysis, and Rationality
Scope Management
HPU - Intelligence Team Management
UM - Intelligence Management and
Oversight
Research Methodologies & Applications
UM - Intelligence Analysis: Consumers,
Uses, and Issues
DC3 - Cyber Analyst Course
UDM - Research Methods
UM - Library Research Skills
NPS - Cyber Systems and Operations
Research Methods
HPU - Open Source Intelligence
MU - Research Methods in Intelligence
AMU - Research Methods
ASU - Introduction to Research Methods
Data Collection
& Examination
Skepticism/Validation/Verification
HPU - Vetting
Research Methodologies & Applications
UM - Intelligence Analysis: Consumers,
Uses, and Issues
DC3 - Cyber Analyst Course
UDM - Research Methods
UM - Library Research Skills
NPS - Cyber Systems and Operations
Research Methods
HPU - Open Source Intelligence
MU - Research Methods in Intelligence
AMU - Research Methods
ASU - Introduction to Research Methods
Skepticism/Validation/Verification
HPU - Vetting
Collection Management
ISA - Intelligence Collection
ASU - Intelligence Analysis and National
Security Perspectives
ISA - Cyber Collections
HPU - Intelligence Operations
HPU - Intelligence Collection
HPU - Intelligence Practicum
HPU - Recruitment Cycle
HPU - All Source Intelligence
NPS - Cyber Systems and Operations
Research Methods
UM - Intelligence Collection: Sources
and Challenges
SN - Cyber Intelligence Training
AMU - Collection
Open Source Data
Communication
& Collaboration
HPU - Open Source Intelligence
ISA - Cyber Collections
AMU - SIGINT
UM - Intelligence Collection: Sources
and Challenges
Defending Assessments
NONE
NONE
Defending Assessments
NONE
NONE
Technical Writing
ERAU - Technical Report Writing
HPU - Writing for Publication
Writing for Leadership
CMU - Professional Writing
HPU - Writing for Publication
ISA - Analyst Training: Writing, Analysis,
and Preparing Briefings
6.18
Debating Skills
NONE
NONE
Knowing your Audience
NONE
NONE
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Communication
& Collaboration
Technical
Exploitation
Conflict Resolution
ISA - Intelligence Concepts for Cyber
Conflict
Attention to Detail
NONE
NONE
Assimilate New Information
NONE
NONE
Public Speaking
ERAU - Speech
UDM - Intelligence Acquisition:
Debriefing and Interviewing Techniques
CMU - Strategic Presentation Skills
HPU - Analytical Methods
Malware
NONE
NONE
Penetration Testing
NPS - Cyber Wargame: Blue Team
CMU - Hacking Exposed
NPS - Cyber Wargame: Red Team
HPU - Analytical methods
NPS - Network Operations
Social Engineering
DISA - Social Networking
DISA - Phishing
NIU - Social Networks and Intelligence
Web Servers
NONE
Wireless Networks
UC - Telecommunications Forensics
Web Applications
NONE
Operating Systems
UC - Principles of Cybersecurity
NONE
NONE
NPS - Computer Architecture and
Operating Systems
Information
Security
Vulnerability Assessments
NPS - Network Vulnerability Assessment
and Risk Mitigation
NPS - Network Operations
Cryptology
UP - Cryptography
Technical Architecture
UM - Cyberspace and Cybersecurity
NPS - Network Security
NPS - Cyber Communications
Architectures
NPS - Computer Architecture and
Operating Systems
NPS - Network Operations in a
Contested Environment
ISA - Cyberforce Superiority
Information Architecture
NONE
Network Defense
ISA - Cyberforce Superiority
Incident Response
UC - Computer Forensics Investigations
NONE
NPS - Network Operations
Computing
Fundamentals
Networks & Networking
NPS - Communications Networks
NPS - Internet Protocols
NPS - Network Operations
NPS - Network Vulnerability Assessment
and Risk Mitigation
NPS - Network Operations in a
Contested Environment
UC - Principles of Cybersecurity
NPS - Network Security
UC - Telecommunications Forensics
UP - Network Security
FSU - Networking Essentials
Operating Systems
UP - Principles of Cybersecurity
NPS - Computer Architecture and
Operating Systems
Databases
NONE
NONE
Programming
UM - Cyberspace and Cybersecurity
NPS - Computer Architecture and
Operating Systems
Scripting
NONE
NONE
Data Mining
CMU - Data Mining
CMU - Business Intelligence and Data
Mining
NPS - Information Management for
Cyber Operations
UC - Critical Incident Command,
Response, and All Hazards
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.19
Programs Reviewed
School Name
Course Name
American Military University
(online)
Research Methods
Strategic Intelligence
School Name
Bellevue University (Nebraska)
(continued)
Analytics II
Strategic Deterrence
Intelligence Operations
Cyberwar and Cyberdeterrence
Threat Analysis
Democracy, Ethnicity, Development
in Africa
Cybercrime Analysis
Democracy, Political Economy and
Human Rights across Asia
Cyber Ethics: Privacy and Intellectual
Property
Democracy, Gender, Reform across
the Middle East
Law, Ethics, and Cybersecurity
Comparative Foreign Policy
Criminal Intel Analysis
Hard and Soft Power
Intelligence Profiling
Deterring the Enemy
Army War College
Counterintelligence
Intelligence Analysis and National
Security Perspectives
Geography and US National Security
Grand Strategy, Intelligence Analysis,
and Rationality
Decision Analysis for Senior Leaders
Strategic Intelligence for
Counterterrorism: Contemporary
Threats to National Security
Transformational Imperative:
Reorganizing in a Multi-polar World
Advanced Intelligence analysis:
Operating in Complex Environments
Cyberwarfare
Cyberspace Theory and Strategic
Security Implications
Practice of US Intelligence and
National Security
Introduction to Research Methods
Applied Statistics
Intelligence Support to Policy
Making: Impact of 9/11
Special Operations: Creating
Strategic Intelligence Effects
Carnegie Mellon University
Business Intelligence and Data
Mining
Cybersecurity in Critical
Infrastructure Protection
Data Mining
Decision Making Under Uncertainty
Cyber Arms Race and the Intelligence
Policy Nexus
Hacking Exposed
Intelligence and Counter-Terrorism
Information Security Risk Analysis
National Security, Transnational
Interests
Information Security: Comparison of
US and European Policies
Comparative Intelligence Cultures
Information Warfare
Post-Conflict Politics: Peacekeeping
and Peacebuilding
Professional Writing
Green Security: Eco-conflict and its
Challenges
White Paper – CITP Training and Education
Domestic and International Security
Environments and the National
Security System
Contemporary Security Issues
and national Security Policies and
Strategies
Information Operations
6.20
Transnational Crime and Corruption
Analyzing Anti-Americanism
Deception, Propaganda and
Disinformation
Bellevue University (Nebraska)
Political Islam and Terrorism
Collection
SIGINT
Angelo State University
Course Name
Information Assurance Policy
Strategic Presentation Skills
Terrorism Security and Intelligence
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
School Name
Department of Defense Cyber
Crime Center (DC3)
Course Name
Counterintelligence in Cyber Space
Phase 1
School Name
Henley-Putnam University
(continued)
Cyber Analyst Course
Terrorism Group Dynamics
Analyzing the Terrorist Mind
Terrorism and Society
Speech
Kidnapping Strategies
Intelligence Technology
Influence Warfare
Computer Forensics
Principles of Information Security
Advanced Consequence
Management and Incident Command
System
Computer Forensics
Computer Intrusion Defense
All Things Digital
Cyberterrorism, Cyberwarfare,
Cybercrime
Business Information System
Data and Intelligence Competitive
Theory
Hostage Negotiation, Hostage
Survival
Organized Crime, Gang and Terrorist
Organizations
Henley-Putnam University
Political Analysis
Extremist Organizations
Cybersecurity Introduction
Technical Report Writing
Ferris State University
Leadership Analysis
Area Studies Analysis
Introduction to Cyber Investigations
Embry-Riddle Aeronautical
University
Course Name
Stalking and Workplace Violence
Risk Analysis and Strategy
Advanced Threat Assessment
Networking Essentials
Background Investigations
Recruitment Cycle
Vehicular Security
Cover
Building and Perimeter Security
Double Agents, Denial, Deception
Explosives and Arson Security
Analytical methods
White Collar Crime
Writing for Publication
Open Source Intelligence
Surveillance and Counterserveillance
Intelligence Operations
Intelligence Practicum
Intelligence Team management
Secret Societies
All Source Intelligence
Intelligence Policy and Reform
Intelligence & Security
Academy, LLC
National Security Policy Process
History of US Intelligence
Intro to US Intelligence
Risk Awareness Intelligence
Homeland Security Intelligence
Intelligence Budget Process
Intelligence Collection
Intelligence Concepts for Cyber
Conflict
WMD Terrorism
Cyber Collections
Counterespionage
Operational intelligence
Vetting
Counter Terrorism: Actionable
Intelligence
Counterterrorism Analysis
Cults and Charismatic Leaders
Advanced Domestic Terrorism
Operational Concepts and Planning
Case Studies in Covert Operations
Strategic Intelligence
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Analyst Training: Writing, Analysis,
and Preparing Briefings
Intelligence Collection
Cyberforce Superiority
Intelligence and the Law
White Paper – CITP Training and Education
6.21
School Name
Mercyhurst University
Course Name
Research Methods in Intelligence
Intelligence Theories and
Applications
School Name
Naval PostGraduate
School (NPS)
(continued)
Network Operations
Cyber Mission Planning
Law Enforcement Intelligence
Cyber Policy Strategy
Intelligence Communications
Network Operations in a Contested
Environment
Contemporary Leadership for
Intelligence
Managing Strategic Intelligence
Information Management for Cyber
Operations
Analytical Techniques
Cyber Wargame: Blue Team
Cyber Threat Analysis
Cyber Wargame: Red Team
Comparative History of Intelligence
Cyber Systems and Operations
Research Methods
Evolution of Counterintelligence
Computer Architecture and Operating
Systems
Intelligence to Support Targeting
Strategic Business Intelligence
Conflict and Cyberspace
Intelligence and the Constitution
Computer Security
Analyzing Financial Crimes
Nonproliferation Analysis
Information Assurance: Secure
Management of Systems
National Security
Network Security
Studies in Terrorism
Network Vulnerability Assessment
and Risk Mitigation
Counterintelligence Events and
Concepts
Penn State
Computer Science
Economics
Intelligence, the Military, and
Warfare
Foreign Languages and Cultures
Counterespionage and Policy Making
Geography
Topics in Intelligence
Information Sciences and Technology
Strategic Crisis Exercise
Political Science
Information Power and National
Security
Psychology
Sociology
Propaganda, Persuasion and
Influence
Information, People, and Technology
Cyber Intelligence
Security and Risk Analysis
Foreign Information and Cyber
Strategies
Threat of Terrorism and Crime
Cyber Threat
Social Networks and Intelligence
Advanced Information Power
Seminar
Naval PostGraduate
School (NPS)
Cyber Communications Architectures
Topics in Signals Operations
Competitive Intelligence
National Intelligence University
Course Name
Cyber Systems and Operations
Secure Ninja
Secure Ninja Cyber Intelligence
Training
Secure Ninja Cyber
Counterintelligence
Secure Ninja Introduction to Cyber
Crime
Communications Networks
Internet Protocols
6.22
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
School Name
University of Detroit Mercy
Course Name
Research Methods
School Name
University of Pittsburgh
Information Science
Spatial Analysis and Mapping
Cryptography
Terrorism
Human Information Processing
Homeland Security and Threat
Assessment
Interactive System Design
Human Factors in Systems
Roots of 21st Century Conflict
Information Security and Privacy
Intelligence Acquisition: Debriefing
and Interviewing Techniques
Network Security
Information Ethics
Policy Analysis and Strategy Creation
Legal Issues in Information Handling
Leadership and Behavior in
Organizational Intelligence
Information Security Professionals
Topics in Intelligence
System Administrator in Information
Systems Security
Seminar in Security Issues
University of Maryland
Course Name
Information System Security Officer
Organizational Theory
Intercultural Communication and
Leadership
System Certifiers
Utica College (online)
Financial Decision Making for
Managers
Cyber Intelligence
Critical National Infrastructures and
National Security
Statistics for Managerial Decision
Making
Cybercrime Investigations
Managing Intelligence Activities
Cyber Counterintelligence
Intelligence Collection: Sources and
Challenges
Domestic Terrorism and Extremist
Groups
Intelligence Analysis: Consumers,
Uses, and Issues
Counterterrorism and Cyber Conflict
Critical Incident Command,
Response, and All Hazards
Espionage and Counterintelligence
Intelligence Led Enforcement
Computer Forensics Investigations
Intelligence Management and
Oversight
Leadership Seminar
Principles of Cybersecurity
Telecommunications Forensics
DISA
Cyber Awareness Challenge
Library Research Skills
IC ISS Awareness
Cyberspace and Cybersecurity
Social Networking
Human Aspects in Cybersecurity:
Ethics, Legal Issues and Psychology
Phishing
National Cybersecurity Policy and
Law
Enterprise Cybersecurity Policy
Global Cybersecurity
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.23
Download