White Paper – CITP Training and Education

advertisement
White Paper – CITP Training
and Education
Melissa Kasan Ludwick
Troy Townsend
Joan P. Downing
September 2013
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.1
Copyright 2013 Carnegie Mellon University
This material is based upon work funded and supported by ODNI under Contract
No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the
Software Engineering Institute, a federally funded research and development center
sponsored by the United States Department of Defense.
Any opinions, findings and conclusions or recommendations expressed in this
material are those of the author(s) and do not necessarily reflect the views of ODNI
or the United States Department of Defense.
NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE
ENGINEERING INSTITUTE MATERIAL IS FURNISHEDON AN “AS-IS” BASIS.
CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED
TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY,
OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON
UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO
FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT.
This material has been approved for public release and unlimited distribution except
as restricted below.
Internal use:* Permission to reproduce this material and to prepare derivative
works from this material for internal use is granted, provided the copyright and “No
Warranty” statements are included with all reproductions and derivative works.
External use:* This material may be reproduced in its entirety, without modification,
and freely distributed in written or electronic form without requesting formal
permission. Permission is required for any other external and/or commercial use.
Requests for permission should be directed to the Software Engineering Institute at
permission@sei.cmu.edu.
* These restrictions do not apply to U.S. government entities.
DM-0000620
6.2
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
White Paper – CITP Training and Education
Executive Summary
From June to December 2012, the Software Engineering Institute (SEI)
at Carnegie Mellon University conducted a survey of cyber intelligence
programs across the public and private sector. Known as the Cyber
Intelligence Tradecraft Project (CITP), SEI researchers developed an indepth assessment process that exposed several shared challenges across
organizations performing cyber intelligence. One of the most compelling
problems was the dearth of training and education opportunities for
analysts in the cyber intelligence field. The goal of the CITP was not to
develop training and education offerings, but rather determine the state
of the practice for cyber intelligence across multiple sectors. Part of this
work included defining the core competencies and skills that make up a
successful cyber intelligence analyst. Having analyzed the data from the
CITP participants, the team first developed a mind map to illustrate these
core competencies and skills. More detailed information can be found later
in the paper.
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
White Paper – CITP Training and Education
6.3
Problem Solving
Diversity of Perspective
Problem Definition
Research Methodologies
& Applications
Collection Management
Validation/Verification
Defending Assessments
Open Source Data
Technical Writing
Writing for Leadership
Debating Skills
Knowing Your Audience
Big Picture/Scope
Management
Conflict Resolution
Attention to Detail
Assimilate New Information
Public Speaking
Data Collection &
Examination
Critical Thinking
Communication &
Collaboration
Cyber Intel Analyst
CORE COMPETENCIES
& SKILLS
Cyber Intel Analyst
TRAITS
Inquisitive
Persistent
Computing Fundamentals
Networks & Networking
Self-Motivated
Team Player
Quick Learner
Open Minded
Generalist
Information Security
Technical Exploitation
Vulnerability Assessments
Malware
Cryptography
Penetration Testing
Technical Architecture
Social Engineering
Information Architecture
Web Servers
Scripting
Network Defense
Wireless Networks
Data Mining
Incident Response
Web Applications
Operating Systems
Databases
Programming
Adaptable
The team reviewed existing course offerings and identified discrepancies
between the ideal skill set for a cyber intelligence analyst and what
courses are actually being offered. The team accomplished this by
• determining the current state of training and education offerings for
cyber intelligence analysts across academia, industry, and government
• defining the competencies and skills organizations should look for when
hiring the “ideal” cyber intelligence analyst
• identifying the gaps between the current and desired state of the
available courses
This white paper begins by defining core competencies and associated
skills that the CITP team has determined are necessary for a cyber
intelligence analyst to possess. The paper then covers existing offerings
for cyber intelligence analysis training and education and how they match
to the skills necessary to work as a cyber intelligence analyst. Finally, the
paper explores how the team conducted a gap analysis, and recommends
some courses of action to address the current state of cyber intelligence
analysis training and education.
6.4
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Problem Definition/Current State
In January 2013, the SEI held a workshop for organizations that
participated in the CITP study. A portion of the workshop was devoted
to eliciting specific skills and traits that organizations wanted from their
cyber intelligence analysts. The team quickly discovered that there was
no standard for what constitutes a cyber intelligence analyst. During
the CITP study, participants were asked to define the skill they valued
most in a cyber intelligence analyst. One organization responded, “five
years of experience.” This anecdote is not an outlier in the data. Many
organizations reported differing demands of cyber intelligence analysts,
typically based on the size of the organization or the maturity of their cyber
intelligence program. Often, organizations did not have clear expectations
for what the analyst’s skills or competencies should be and decided that
the way around this was to hire experienced analysts (typically from the
government) and hope that the previous employer had sufficiently trained
them, thus alleviating that burden from the hiring organization. While hiring
away another organization’s analyst may solve an immediate need, it does
little to address the crux of the problem. The implications of not having a
standard set of skills and competencies for cyber intelligence analysts are
three-fold.
First, as alluded to above, the absence of clearly defined competencies
and skills presents organizations with hiring challenges. Generally,
organizations have two options for staffing cyber intelligence analysts:
take a non-technical analyst and provide them with training in cyber
security, or take a technical practitioner and teach them to look at the
bigger picture and analyze technical data through a strategic lens.
While many CITP participants advocated for hiring an inquisitive, critical
thinker with a liberal arts background, when we surveyed what their staff
consisted of it was almost unanimously Certified Information Systems
Security Professional (CISSP) or Certified Ethical Hacking (CEH) certified
network security practitioners that were promoted out of help desk or
incident response roles. The exceptions to these cases occurred in the
government, where organizations have the resources and the time to send
analysts through months of internal training programs that groom them to
be cyber intelligence analysts.
Similarly, in the Air Force there is a 93-day program to train Airmen to
become Network Intelligence Analysts1. Such opportunities are missing
in the private sector, and many organizations cannot unilaterally afford to
create and maintain a program like the Air Force program.
Second, the lack of competencies and skills resulted in inconsistent
training plans, no training path at all, or a costly “grab bag” approach
where analysts were sent to a mix of technical classes that often
overlapped in content or failed to address non-technical skills expected of
intelligence analysts. The SEI conducted a survey of more than 100 courses
including programs and certifications offered by academic institutions
and private industry, and more than 40 offered by various components
within the Department of Defense (DoD). Some of these programs were
advertised specifically as cyber intelligence courses, others were
technical components of a larger program in intelligence studies. As
the analysis outlined in this paper will show, these programs, with few
exceptions, were ineffective at addressing all of the key skills necessary
for a cyber intelligence analyst. Instead, analysts have to navigate a
series of courses to develop the skills required for strategic analysis of
technical data. Alternatively, our research suggests that analysts can learn
much of these skills through on-the-job training with mentors, hands-on
apprenticeships, and being exposed to real-world scenarios, data, and
tools that are absent from many of today’s traditional classroom offerings.
Lastly, the lack of clearly defined skills and competencies for cyber
intelligence analysts is a roadblock to professionalizing the workforce.
In a community with such diverse backgrounds and experiences, it is
difficult for the cyber intelligence community to establish standards that
would benefit the profession. For example, government terminology is very
different from the terminology used in industry. This discrepancy exists
in part because the government has carefully shaped their definitions to
allow the military and intelligence community to operate in cyberspace
without breaking laws. For example, the definition of “computer network
attack” was carefully crafted so that the activities of the intelligence
community to gather data from targets would not constitute an “attack” (it
is considered exploitation, not attack). However, the very same tactics are
used by cyber actors against U.S. companies every day, and companies
consider those activities as attacks against their networks. Standardizing
the qualifications and training of cyber intelligence analysts would
go a long way toward creating a standard lexicon and taxonomy. This
standardization would improve the communication between analysts at
different organizations, leading to improved collaboration on cyber threats.
The challenge in cyber intelligence analysis is not a technology challenge
– the technology exists. Structured Threat Information Expression (STIX)
and the Trusted Automated Exchange of Indicator Information (TAXII)
frameworks enable analysts are able to communicate and collaborate to
produce useful analysis products. The main obstacle to effective cyber
intelligence analysts is that the analysts themselves have different training,
experiences, and backgrounds that prevent them from communicating
effectively.
Although the team was thorough in their work, there were still limitations
to the availability of data that could be collected. Limitations included
the inability to collect every course offering available; searches
were restricted to information found online, mainly course titles and
descriptions. The team was able to collect information from a small number
of government offerings. The team, however, did not review any classified
courses. Phone conversations provided insightful information from both
academia and private industry. In spite of these limitations, the team was
able collect a large sample of courses, training, and certifications offered
to cyber intelligence analysts. See appendix A Gap Analysis Spreadsheet.
1 W
isniewski, Brian. “A Brief Survey of the Demographics of the Current
Uniformed DoD Cyber Workforce.” Proceedings of the Military Operations
Research Symposium. June 2013.
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.5
Traits, Core Competencies, and Skills
Throughout the project the team was able to spend a significant amount of time with practitioners learning about the capabilities and personality types
required to conduct effective cyber intelligence. This information was divided into two categories: traits and competencies. Personality traits are naturally
ingrained in an analyst. These natural traits are often difficult to teach. However, mentors and educators can encourage the development of these traits.
For example, a person may not be naturally persistent, but coursework requires them to continue to ask questions, find out more information, and become
more thorough in their work.
Competencies are comprised of a set of teachable skills. Problem definition, scope management, and research methodologies are some examples of the
skills that address the larger competency of critical thinking. The following graphics describe the essential core competencies, skills, and traits of the
cyber intelligence workforce.
Problem Solving
Diversity of Perspective
Problem Definition
Research Methodologies
& Applications
Collection Management
Validation/Verification
Defending Assessments
Open Source Data
Technical Writing
Writing for Leadership
Debating Skills
Knowing Your Audience
Big Picture/Scope
Management
Conflict Resolution
Attention to Detail
Assimilate New Information
Public Speaking
Data Collection &
Examination
Critical Thinking
Communication &
Collaboration
Cyber Intel Analyst
Cyber Intel Analyst
CORE COMPETENCIES
& SKILLS
TRAITS
Inquisitive
Persistent
Self-Motivated
Team Player
Computing Fundamentals
Information Security
Networks & Networking
Operating Systems
Databases
Technical Exploitation
Vulnerability Assessments
Malware
Cryptography
Penetration Testing
Technical Architecture
Social Engineering
Information Architecture
Web Servers
Quick Learner
Programming
Open Minded
Scripting
Network Defense
Wireless Networks
Data Mining
Incident Response
Web Applications
Generalist
Adaptable
Cyber Intel Analyst
TRAITS
Inquisitive
Always interested to know more,
ask questions, verify findings
Persistent
Not deterred by opposition, continues
to work to find answers and solutions
Self-Motivated Team Player
Able to work independently, not need
constant guidance and monitoring, also
able to ask for help, recognize other’s
strengths, and collaborate effectively
6.6
White Paper – CITP Training and Education
Quick Learner
Interested in learning, able to
understand and utilize new information,
ask for help when needed
Open Minded
Able to accept different solutions
and ideas, approaches information and
hypothesis with healthy skepticism.
Generalist
Interested in multiple topics, not
”in the weeds“ on a single subject
Adaptable
Able to thrive in chaos, change focus,
react quickly
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Critical Thinking Competency
Problem Solving
Diversity of Perspective
Data Collection &
Examination
Critical Thinking
Communication &
Collaboration
Cyber Intel Analyst
Cyber Intel Analyst
CORE COMPETENCIES
& SKILLS
TRAITS
Computing Fundamentals
Information Security
Technical Exploitation
Problem Definition
Research Methodologies
& Applications
Validation/Verification
Big Picture/Scope
Management
Critical Thinking
Cyber Intel Analyst
CORE COMPETENCIES
& SKILLS
Critical thinking is essential for intelligence analysts. The foundation of
successful intelligence work is the analyst’s ability to define the problem,
apply research methods, and think strategically to recommend a course of
action.
Problem Definition - Define a problem to be solved.
Problem Solving - Understand the problem; think creatively to provide a
solution(s) in a timely manner.
Diversity of Perspective - Look at the problem from multiple angles,
appreciate that different backgrounds and experiences enhance the
solution.
Big Picture/Summarization/Synthesis - Think strategically and recognize
how solutions and recommendations are utilized.
Scope Management - Understand the work that needs to be done to
provide a solution, realize when to stop working.
Research Methodologies & Applications - Have a working knowledge
of diverse research methods and how to utilize methods to shape data
gathering, analysis, and reporting. (This skill is also essential to the “Data
Collection and Examination” core competency.)
Validation/Verification - Approach potential solutions with healthy
skepticism, explore different possibilities to validate and verify findings
and conclusions. (This skill is also essential to the “Data Collection and
Examination” core competency.)
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.7
Data Collection & Examination Competency
Data Collection &
Examination
Critical Thinking
Communication &
Collaboration
Research Methodologies
& Applications
Collection Management
Validation/Verification
Defending Assessments
Open Source Data
Cyber Intel Analyst
Cyber Intel Analyst
CORE COMPETENCIES
& SKILLS
TRAITS
Computing Fundamentals
Information Security
Technical Exploitation
Data Collection &
Examination
Cyber Intel Analyst
CORE COMPETENCIES
& SKILLS
The analyst’s next step after defining the problem is to collect data. Data
collection helps the analyst provide a decision maker with actionable
recommendations. It is crucial for analysts to be disciplined when
collecting and managing information and using that data to produce
reliable recommendations.
Research Methodologies & Applications - Possess a working knowledge
of diverse research methods and how to utilize methods to shape data
gathering, analysis, and reporting. (This skill is also essential to the “Critical
Thinking” core competency.)
Validation/Verification - Approach collected information with healthy
skepticism and explore different possibilities to validate and verify findings
and conclusions. (This skill is also related to the “Critical Thinking” core
competency.)
Collection Management - Understand how to turn requirements for
intelligence into collection requirements, collect, prioritize, and store
information from multiple intelligence disciplines.
Open Source Data - Possess an operational understanding of how to
ascertain, validate, and employ data from sources that are generally
available to the public.
Defending Assessments - Have the ability to explain and defend the
assessments and recommendations that are made.
6.8
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Communication & Collaboration Competency
Technical Writing
Writing for Leadership
Data Collection &
Examination
Critical Thinking
Communication &
Collaboration
Cyber Intel Analyst
Cyber Intel Analyst
CORE COMPETENCIES
& SKILLS
Knowing Your Audience
TRAITS
Computing Fundamentals
Debating Skills
Information Security
Technical Exploitation
Conflict Resolution
Attention to Detail
Assimilate New Information
Public Speaking
Cyber Intel Analyst
Communication &
Collaboration
CORE COMPETENCIES
& SKILLS
“Strong communication skills” is such a common phrase that it is
almost discounted when searching for an analyst. The team received
overwhelming responses from skilled practitioners supporting the need
for intelligence analysts to have the ability to communicate, write for
leadership, and understand the audience.
Technical Writing - Provide sufficient technical detail to show data
gathering and analysis to support recommendations.
Writing for Leadership - Understand how leadership will utilize
recommendations and communicate relevant data.
Debating Skills - Explain and defend assessments and recommendations.
Knowing Your Audience - Understand the potential audience(s) of your
product and craft the product to have the most impact to that audience.
Conflict Resolution - Know how to quickly identify a resolution to a
discrepancy when collaborating on an intelligence project.
Attention to Detail - Show attention to detail when examining data and
communicating recommendations.
Assimilate New Information - Take new information and be able to
understand and utilize it throughout the intelligence lifecycle.
Public Speaking - Be able to present findings and recommendations in a
public environment.
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.9
Computing Fundamentals Competency
Data Collection &
Examination
Critical Thinking
Cyber Intel Analyst
Communication &
Collaboration
CORE COMPETENCIES
& SKILLS
Cyber Intel Analyst
Cyber Intel Analyst
CORE COMPETENCIES
& SKILLS
TRAITS
Computing Fundamentals
Information Security
Technical Exploitation
Computing Fundamentals
Networks & Networking
Operating Systems
Databases
Programming
Scripting
Data Mining
This competency outlines the basic computing concepts that analysts
should utilize to understand the environment they are operating in and how
to gather and use the data that they are collecting.
Networks & Networking - Understand and utilize physical components,
types of networks, protocols, and topologies.
Operating-Systems - Understand and utilize different operating-systems
and operating system components.
Databases - Understand and utilize database types and applications.
Programming - Understand and utilize programming processes,
methodologies, and programming languages.
Scripting - Understand and utilize roles and types of scripting languages.
Data Mining - Understand how to pull information from large data sets and
how to structure information for reuse.
6.10
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Information Security Competency
Data Collection &
Examination
Critical Thinking
Communication &
Collaboration
Cyber Intel Analyst
Cyber Intel Analyst
CORE COMPETENCIES
& SKILLS
TRAITS
Computing Fundamentals
Information Security
Cyber Intel Analyst
CORE COMPETENCIES
& SKILLS
Technical Exploitation
Information Security
Vulnerability Assessments
Cryptography
Technical Architecture
Information Architecture
Network Defense
Incident Response
Intelligence analysts should have an understanding of basic security
concepts. This understanding should be used to collaborate and share
information with an organization’s cybersecurity function.
Vulnerability Assessments - Identify and prioritize system vulnerabilities.
Cryptography - Utilize techniques and technologies for secure
communications
Technical Architecture - Utilize a framework for the networks, Open
Systems Interconnection (OSI) model.
Information Architecture - Understand categorization and organization of
data, data access patterns, permissions, data flow, and governance.
Network Defense - Understand how to protect, monitor, and respond to
network attacks, reconnaissance, and intrusions.
Incident Response - Utilize incident management process and response to
computer events.
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.11
Technical Exploitation Competency
Data Collection &
Examination
Critical Thinking
Cyber Intel Analyst
Cyber Intel Analyst
CORE COMPETENCIES
& SKILLS
TRAITS
Computing Fundamentals
Information Security
Cyber Intel Analyst
Communication &
Collaboration
Technical Exploitation
CORE COMPETENCIES
& SKILLS
Technical Exploitation
Malware
Penetration Testing
Social Engineering
Web Servers
Wireless Networks
Web Applications
Intelligence analysts must be well versed in the techniques that actors
utilize to attack an organization.
Malware - Understand intrusive and disruptive software–viruses, worms,
Trojans, rootkits, etc.
Penetration Testing - Utilize simulated attacks to evaluate and improve
network security.
Social Engineering - Understand that social engineering can be used to
manipulate employees, partners, and suppliers into provide information or
unknowingly perform malicious activities.
Web Servers - Understand security concerns associated with web
content, physical and virtual web servers.
Wireless networks - Understand types of wireless networks, wireless
devices, and vulnerabilities.
Web Applications - Understand how web applications can be exploited.
6.12
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Gap Analysis
After defining the traits, competencies, and skills of an ideal intelligence
analyst, the team set out to understand the coursework offered to current
and prospective analysts. To determine the current training and education
opportunities, the team surveyed more than 150 courses, trainings,
and certifications offered by academic institutions, private industry, and
the DoD.
Findings
From the collected data, the team learned that government, private
industry, and academic institutions do address more than half of the
competencies and skills needed to become a cyber intelligence analyst.
The team also confirmed that there are several discrepancies between
the skills that analysts need and training opportunities that are offered.
The training paths to become a qualified cyber intelligence analyst are
inconsistent or nonexistent in some cases. This puts the analyst at a
disadvantage because they are not taught content that gives them both the
technical and non-technical skills required to perform their job. This also
puts hiring organizations (both government and industry) at a disadvantage
because they need to invest time and money to appropriately equip their
analysts. The team found that academic institutions offered a variety of
programs that were either technical or non-technical in nature. Not one
program offered an ideal mix of classes; there was frequent overlap in
content or failure to address skills that are specific to intelligence analysts.
Furthermore, academic institutions are not always able to provide courses
that use relevant tools and technology with current data and threats;
however, private organizations have the ability to offer these courses by
exposing analysts to real-world scenarios, data, and tools. Analysts can
also learn skills not taught in classrooms through on-the-job training and
hands-on internships provided by an organization.
Government
The team was only able to capture a small amount of data that pertained
to the programs the government makes available to cyber intelligence
analysts, while still keeping the review of coursework at the unclassified
level. From the data the team collected, it was clear that the government
offers programs and training that are very resource-intensive. Government
offerings are more expensive and require longer time commitments than
other training programs. Although government organizations that create
and maintain their own training programs are relatively successful, it is not
organizationally cost effective for private industry to create and maintain
their own internal cyber intelligence training programs.
Academic Institutions
Academic institutions offer a wide selection of courses that range
anywhere from basic information technology to information security.
This broad range gives analysts options; however, it does not give them
a clear path to follow when their focus is cyber intelligence. Academic
institutions are great at producing individuals that understand analysis but
their courses lack the relevant tools and data an analyst needs to develop
“real-world” skills.
Existing Gaps
To identify the existing gaps between the current and desired training and
education opportunities, the team defined the core competencies and
the correlating skills that are necessary for a cyber intelligence analyst.
Next, the existing training and education offerings were matched to the
newly identified core competencies and skills, shown in the Appendix A
Gap Analysis Spreadsheet. The analysis shows that although the current
offerings do have pockets of excellence the current curriculums do not
address 35 percent of desired skills, shown in Figure 1. The deficient skills
within the Computing Fundamentals, Information Security, and Technical
Exploitation competencies are all technical skills that are taught in academic
institutions and by private industry organizations. However, in academic
institutions these courses often are not offered to intelligence analysts.
The deficient skills found within the Critical Thinking, Data Collection
& Examination, and Communication & Collaboration competencies are
less technical in nature and are often taught as components of Liberal
Arts courses, rather than having its own dedicated course. For example,
the ability to know your audience and pay attention to detail are skills
that should be taught to any analyst in any course that involves report
preparation, presentation, and analysis. Courses need to address multiple
skills in a single offering, equipping the analyst for a successful cyber
intelligence career. For example, our research identified a course from
the Naval Post Graduate School, Cyber Systems and Operations Research
Methods, that teaches research methodologies and applications,
collection management, analysis, and writing.
Private Industry
Surveys showed that organizations hire either a) analysts, training them in
cyber security, or b) technical experts, teaching them to analyze technical
data strategically. The team discovered that although organizations
said they wanted to hire an inquisitive, critical thinker with a liberal arts
background they were, in fact, mostly hiring technical experts. This
approach to hiring staff does not work; organizations usually fall short
when offering courses and training that focus on security and neglects
analysis.
Figure 1: Skill Set Gaps
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.13
Potential Courses of Action
The CITP uncovered deficiencies in training and education opportunities
for cyber intelligence analysts. The project team, through surveys and
research, determined the traits, competencies, and skills that should
create the ubiquitous and clear standard for what constitutes a cyber
intelligence analyst. The team offers the following courses of action to
greatly improve the education, recruitment, and professional development
of cyber intelligence.
Assess Current Analysts and Identify Appropriate Training to
Address Deficiencies
Academic institutions, private industry, and government should use the
competencies and skills from the Intel Competencies Mind Map to review
the current skill set of their intelligence analysts, target specific skills that
are in need of improvement, then seek courses that specifically address
those skills. Alternatively, organizations can develop training that will
address the skills and competencies needed to perform cyber intelligence.
Finally, organizations should identify a clear learning path for analysts that
consist of core competencies and skills identified.
Rethink the Traditional Classroom
Industry and academic institutions offer an array of cyber intelligence
education and training opportunities through traditional classroom
instruction, online tutorials, and certification programs. Despite the variety
of offerings, project participants indicated that these programs do not
fully meet their organization’s needs. Participants expressed that the
use of traditional teaching methods for cyber intelligence is antiquated
because they fail to produce analysts with the versatility and critical
thinking skills needed to succeed in the diverse and ever-changing cyber
environment. The team believes that many of the deficiencies in today’s
cyber intelligence training programs can be addressed through advanced
tradecraft technology. This technology leverages cyber intelligence,
computer science, and visual analytics to provide a dynamic, virtual
platform for individuals to hone technical and analytical skills. The principle
goal of advanced tradecraft technology is to place students into real-world
scenarios where the student is able to conduct multi-source analysis,
understand critical information that is needed to make recommendations
and decisions, and can impact strategic decisions.
Hire Differently
Organizations should invest in the time to review and rewrite job
descriptions for new employees. Using the competencies and skills mind
map, organizations should identify which competencies and skills address
their current needs, and then craft the job description to look for the
best candidate. During the interview process use the list of traits to ask
questions to determine if the candidate has the natural abilities required to
be a successful intelligence analyst.
Explore Internships and Apprenticeships
During the participant workshop, organizations emphasized the desire
to establish internships and apprenticeships. The relationship between
academic institutions and hiring organizations is mutually beneficial. The
hiring organization is able to gain short-term talent, the ability to recruit
qualified individuals, and provide feedback to schools. The academic
institution is able to build a relationship with the hiring organization,
which benefits the students, and will give them feedback to improve their
curriculum.
6.14
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Appendix A: Gap Analysis Spreadsheet
Competency and Skill List
Competency
Skill
Critical Thinking
Problem Solving
Big Picture/Summarization/Synthesis
Scope Management
Research Methodologies & Applications
Skepticism/Validation/Verification
Data Collection & Examination
Research Methodologies & Applications
Skepticism/Validation/Verification
Collection Management
Open Source Data
Communication & Collaboration
Technical Writing
Writing for Leadership
Conflict Resolution
Public Speaking
Technical Exploitation
Penetration Testing
Social Engineering
Wireless Networks
Operating Systems
Information Security
Vulnerability Assessments
Cryptology
Technical Architecture
Network Defense
Incident Response
Computing Fundamentals
Networks & Networking
Operating Systems
Programming
Data Mining
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.15
Competency
Skill
Critical Thinking
Problem Solving
Big Picture/Summarization/Synthesis
Scope Management
Research Methodologies & Applications
Skepticism/Validation/Verification
Data Collection & Examination
Research Methodologies & Applications
Skepticism/Validation/Verification
Collection Management
Open Source Data
Communication & Collaboration
Technical Writing
Writing for Leadership
Conflict Resolution
Public Speaking
Technical Exploitation
Penetration Testing
Social Engineering
Wireless Networks
Operating Systems
Information Security
Vulnerability Assessments
Cryptology
Technical Architecture
Network Defense
Incident Response
Computing Fundamentals
Networks & Networking
Operating Systems
Programming
Data Mining
6.16
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Competency
Skill
Critical Thinking
Problem Definition
Problem Solving
Diversity of Perspective
Big Picture/Summarization/Synthesis
Scope Management
Research Methodologies & Applications
Skepticism/Validation/Verification
Data Collection & Examination
Research Methodologies & Applications
Skepticism/Validation/Verification
Collection Management
Open Source Data
Defending Assessments
Communication & Collaboration
Defending Assessments
Technical Writing
Writing for Leadership
Debating Skills
Knowing your Audience
Conflict Resolution
Attention to Detail
Assimilate New Information
Public Speaking
Technical Exploitation
Malware
Penetration Testing
Social Engineering
Web Servers
Wireless Networks
Web Applications
Operating Systems
Information Security
Vulnerability Assessments
Cryptology
Technical Architecture
Information Architecture
Network Defense
Incident Response
Computing Fundamentals
Networks & Networking
Operating Systems
Databases
Programming
Scripting
Data Mining
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.17
Applicable Programs and Courses
Courses
Competency
Skill
Good
Maybe
Critical Thinking
Problem Definition
NONE
NONE
Problem Solving
AMU - Intelligence Operations
AMU - Analytics II
AMU Threat Analysis
MU - Analytic Techniques
MU - Cyber Threat Analysis
ASU - Advanced Intelligence analysis:
Operating in Complex Environments
Diversity of Perspective
NONE
NONE
Big Picture/Summarization/Synthesis
ASU - Grand Strategy, Intelligence
Analysis, and Rationality
Scope Management
HPU - Intelligence Team Management
UM - Intelligence Management and
Oversight
Research Methodologies & Applications
UM - Intelligence Analysis: Consumers,
Uses, and Issues
DC3 - Cyber Analyst Course
UDM - Research Methods
UM - Library Research Skills
NPS - Cyber Systems and Operations
Research Methods
HPU - Open Source Intelligence
MU - Research Methods in Intelligence
AMU - Research Methods
ASU - Introduction to Research Methods
Data Collection
& Examination
Skepticism/Validation/Verification
HPU - Vetting
Research Methodologies & Applications
UM - Intelligence Analysis: Consumers,
Uses, and Issues
DC3 - Cyber Analyst Course
UDM - Research Methods
UM - Library Research Skills
NPS - Cyber Systems and Operations
Research Methods
HPU - Open Source Intelligence
MU - Research Methods in Intelligence
AMU - Research Methods
ASU - Introduction to Research Methods
Skepticism/Validation/Verification
HPU - Vetting
Collection Management
ISA - Intelligence Collection
ASU - Intelligence Analysis and National
Security Perspectives
ISA - Cyber Collections
HPU - Intelligence Operations
HPU - Intelligence Collection
HPU - Intelligence Practicum
HPU - Recruitment Cycle
HPU - All Source Intelligence
NPS - Cyber Systems and Operations
Research Methods
UM - Intelligence Collection: Sources
and Challenges
SN - Cyber Intelligence Training
AMU - Collection
Open Source Data
Communication
& Collaboration
HPU - Open Source Intelligence
ISA - Cyber Collections
AMU - SIGINT
UM - Intelligence Collection: Sources
and Challenges
Defending Assessments
NONE
NONE
Defending Assessments
NONE
NONE
Technical Writing
ERAU - Technical Report Writing
HPU - Writing for Publication
Writing for Leadership
CMU - Professional Writing
HPU - Writing for Publication
ISA - Analyst Training: Writing, Analysis,
and Preparing Briefings
6.18
Debating Skills
NONE
NONE
Knowing your Audience
NONE
NONE
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Communication
& Collaboration
Technical
Exploitation
Conflict Resolution
ISA - Intelligence Concepts for Cyber
Conflict
Attention to Detail
NONE
NONE
Assimilate New Information
NONE
NONE
Public Speaking
ERAU - Speech
UDM - Intelligence Acquisition:
Debriefing and Interviewing Techniques
CMU - Strategic Presentation Skills
HPU - Analytical Methods
Malware
NONE
NONE
Penetration Testing
NPS - Cyber Wargame: Blue Team
CMU - Hacking Exposed
NPS - Cyber Wargame: Red Team
HPU - Analytical methods
NPS - Network Operations
Social Engineering
DISA - Social Networking
DISA - Phishing
NIU - Social Networks and Intelligence
Web Servers
NONE
Wireless Networks
UC - Telecommunications Forensics
Web Applications
NONE
Operating Systems
UC - Principles of Cybersecurity
NONE
NONE
NPS - Computer Architecture and
Operating Systems
Information
Security
Vulnerability Assessments
NPS - Network Vulnerability Assessment
and Risk Mitigation
NPS - Network Operations
Cryptology
UP - Cryptography
Technical Architecture
UM - Cyberspace and Cybersecurity
NPS - Network Security
NPS - Cyber Communications
Architectures
NPS - Computer Architecture and
Operating Systems
NPS - Network Operations in a
Contested Environment
ISA - Cyberforce Superiority
Information Architecture
NONE
Network Defense
ISA - Cyberforce Superiority
Incident Response
UC - Computer Forensics Investigations
NONE
NPS - Network Operations
Computing
Fundamentals
Networks & Networking
NPS - Communications Networks
NPS - Internet Protocols
NPS - Network Operations
NPS - Network Vulnerability Assessment
and Risk Mitigation
NPS - Network Operations in a
Contested Environment
UC - Principles of Cybersecurity
NPS - Network Security
UC - Telecommunications Forensics
UP - Network Security
FSU - Networking Essentials
Operating Systems
UP - Principles of Cybersecurity
NPS - Computer Architecture and
Operating Systems
Databases
NONE
NONE
Programming
UM - Cyberspace and Cybersecurity
NPS - Computer Architecture and
Operating Systems
Scripting
NONE
NONE
Data Mining
CMU - Data Mining
CMU - Business Intelligence and Data
Mining
NPS - Information Management for
Cyber Operations
UC - Critical Incident Command,
Response, and All Hazards
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.19
Programs Reviewed
School Name
Course Name
American Military University
(online)
Research Methods
Strategic Intelligence
School Name
Bellevue University (Nebraska)
(continued)
Analytics II
Strategic Deterrence
Intelligence Operations
Cyberwar and Cyberdeterrence
Threat Analysis
Democracy, Ethnicity, Development
in Africa
Cybercrime Analysis
Democracy, Political Economy and
Human Rights across Asia
Cyber Ethics: Privacy and Intellectual
Property
Democracy, Gender, Reform across
the Middle East
Law, Ethics, and Cybersecurity
Comparative Foreign Policy
Criminal Intel Analysis
Hard and Soft Power
Intelligence Profiling
Deterring the Enemy
Army War College
Counterintelligence
Intelligence Analysis and National
Security Perspectives
Geography and US National Security
Grand Strategy, Intelligence Analysis,
and Rationality
Decision Analysis for Senior Leaders
Strategic Intelligence for
Counterterrorism: Contemporary
Threats to National Security
Transformational Imperative:
Reorganizing in a Multi-polar World
Advanced Intelligence analysis:
Operating in Complex Environments
Cyberwarfare
Cyberspace Theory and Strategic
Security Implications
Practice of US Intelligence and
National Security
Introduction to Research Methods
Applied Statistics
Intelligence Support to Policy
Making: Impact of 9/11
Special Operations: Creating
Strategic Intelligence Effects
Carnegie Mellon University
Business Intelligence and Data
Mining
Cybersecurity in Critical
Infrastructure Protection
Data Mining
Decision Making Under Uncertainty
Cyber Arms Race and the Intelligence
Policy Nexus
Hacking Exposed
Intelligence and Counter-Terrorism
Information Security Risk Analysis
National Security, Transnational
Interests
Information Security: Comparison of
US and European Policies
Comparative Intelligence Cultures
Information Warfare
Post-Conflict Politics: Peacekeeping
and Peacebuilding
Professional Writing
Green Security: Eco-conflict and its
Challenges
White Paper – CITP Training and Education
Domestic and International Security
Environments and the National
Security System
Contemporary Security Issues
and national Security Policies and
Strategies
Information Operations
6.20
Transnational Crime and Corruption
Analyzing Anti-Americanism
Deception, Propaganda and
Disinformation
Bellevue University (Nebraska)
Political Islam and Terrorism
Collection
SIGINT
Angelo State University
Course Name
Information Assurance Policy
Strategic Presentation Skills
Terrorism Security and Intelligence
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
School Name
Department of Defense Cyber
Crime Center (DC3)
Course Name
Counterintelligence in Cyber Space
Phase 1
School Name
Henley-Putnam University
(continued)
Cyber Analyst Course
Terrorism Group Dynamics
Analyzing the Terrorist Mind
Terrorism and Society
Speech
Kidnapping Strategies
Intelligence Technology
Influence Warfare
Computer Forensics
Principles of Information Security
Advanced Consequence
Management and Incident Command
System
Computer Forensics
Computer Intrusion Defense
All Things Digital
Cyberterrorism, Cyberwarfare,
Cybercrime
Business Information System
Data and Intelligence Competitive
Theory
Hostage Negotiation, Hostage
Survival
Organized Crime, Gang and Terrorist
Organizations
Henley-Putnam University
Political Analysis
Extremist Organizations
Cybersecurity Introduction
Technical Report Writing
Ferris State University
Leadership Analysis
Area Studies Analysis
Introduction to Cyber Investigations
Embry-Riddle Aeronautical
University
Course Name
Stalking and Workplace Violence
Risk Analysis and Strategy
Advanced Threat Assessment
Networking Essentials
Background Investigations
Recruitment Cycle
Vehicular Security
Cover
Building and Perimeter Security
Double Agents, Denial, Deception
Explosives and Arson Security
Analytical methods
White Collar Crime
Writing for Publication
Open Source Intelligence
Surveillance and Counterserveillance
Intelligence Operations
Intelligence Practicum
Intelligence Team management
Secret Societies
All Source Intelligence
Intelligence Policy and Reform
Intelligence & Security
Academy, LLC
National Security Policy Process
History of US Intelligence
Intro to US Intelligence
Risk Awareness Intelligence
Homeland Security Intelligence
Intelligence Budget Process
Intelligence Collection
Intelligence Concepts for Cyber
Conflict
WMD Terrorism
Cyber Collections
Counterespionage
Operational intelligence
Vetting
Counter Terrorism: Actionable
Intelligence
Counterterrorism Analysis
Cults and Charismatic Leaders
Advanced Domestic Terrorism
Operational Concepts and Planning
Case Studies in Covert Operations
Strategic Intelligence
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE Analyst Training: Writing, Analysis,
and Preparing Briefings
Intelligence Collection
Cyberforce Superiority
Intelligence and the Law
White Paper – CITP Training and Education
6.21
School Name
Mercyhurst University
Course Name
Research Methods in Intelligence
Intelligence Theories and
Applications
School Name
Naval PostGraduate
School (NPS)
(continued)
Network Operations
Cyber Mission Planning
Law Enforcement Intelligence
Cyber Policy Strategy
Intelligence Communications
Network Operations in a Contested
Environment
Contemporary Leadership for
Intelligence
Managing Strategic Intelligence
Information Management for Cyber
Operations
Analytical Techniques
Cyber Wargame: Blue Team
Cyber Threat Analysis
Cyber Wargame: Red Team
Comparative History of Intelligence
Cyber Systems and Operations
Research Methods
Evolution of Counterintelligence
Computer Architecture and Operating
Systems
Intelligence to Support Targeting
Strategic Business Intelligence
Conflict and Cyberspace
Intelligence and the Constitution
Computer Security
Analyzing Financial Crimes
Nonproliferation Analysis
Information Assurance: Secure
Management of Systems
National Security
Network Security
Studies in Terrorism
Network Vulnerability Assessment
and Risk Mitigation
Counterintelligence Events and
Concepts
Penn State
Computer Science
Economics
Intelligence, the Military, and
Warfare
Foreign Languages and Cultures
Counterespionage and Policy Making
Geography
Topics in Intelligence
Information Sciences and Technology
Strategic Crisis Exercise
Political Science
Information Power and National
Security
Psychology
Sociology
Propaganda, Persuasion and
Influence
Information, People, and Technology
Cyber Intelligence
Security and Risk Analysis
Foreign Information and Cyber
Strategies
Threat of Terrorism and Crime
Cyber Threat
Social Networks and Intelligence
Advanced Information Power
Seminar
Naval PostGraduate
School (NPS)
Cyber Communications Architectures
Topics in Signals Operations
Competitive Intelligence
National Intelligence University
Course Name
Cyber Systems and Operations
Secure Ninja
Secure Ninja Cyber Intelligence
Training
Secure Ninja Cyber
Counterintelligence
Secure Ninja Introduction to Cyber
Crime
Communications Networks
Internet Protocols
6.22
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
School Name
University of Detroit Mercy
Course Name
Research Methods
School Name
University of Pittsburgh
Information Science
Spatial Analysis and Mapping
Cryptography
Terrorism
Human Information Processing
Homeland Security and Threat
Assessment
Interactive System Design
Human Factors in Systems
Roots of 21st Century Conflict
Information Security and Privacy
Intelligence Acquisition: Debriefing
and Interviewing Techniques
Network Security
Information Ethics
Policy Analysis and Strategy Creation
Legal Issues in Information Handling
Leadership and Behavior in
Organizational Intelligence
Information Security Professionals
Topics in Intelligence
System Administrator in Information
Systems Security
Seminar in Security Issues
University of Maryland
Course Name
Information System Security Officer
Organizational Theory
Intercultural Communication and
Leadership
System Certifiers
Utica College (online)
Financial Decision Making for
Managers
Cyber Intelligence
Critical National Infrastructures and
National Security
Statistics for Managerial Decision
Making
Cybercrime Investigations
Managing Intelligence Activities
Cyber Counterintelligence
Intelligence Collection: Sources and
Challenges
Domestic Terrorism and Extremist
Groups
Intelligence Analysis: Consumers,
Uses, and Issues
Counterterrorism and Cyber Conflict
Critical Incident Command,
Response, and All Hazards
Espionage and Counterintelligence
Intelligence Led Enforcement
Computer Forensics Investigations
Intelligence Management and
Oversight
Leadership Seminar
Principles of Cybersecurity
Telecommunications Forensics
DISA
Cyber Awareness Challenge
Library Research Skills
IC ISS Awareness
Cyberspace and Cybersecurity
Social Networking
Human Aspects in Cybersecurity:
Ethics, Legal Issues and Psychology
Phishing
National Cybersecurity Policy and
Law
Enterprise Cybersecurity Policy
Global Cybersecurity
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE White Paper – CITP Training and Education
6.23
6.24
White Paper – CITP Training and Education
CARNEGIE MELLON UNIVERSITY | SOFTWARE ENGINEERING INSTITUTE
Download