Aug

22

2022

Counterintelligence 101 Certificate Crash Course

Laser 22 Aug 2022 09:33 LEARNING » e-learning - Tutorial

Counterintelligence 101 Certificate Crash Course
Published 8/2022MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 747.62 MB | Duration: 0h 37m

A crash course in counterintelligence, with certificate presented by Archangel Protective Intelligence

What you'll learn
Students will learn the language of counterintelligence
Students will learn espionage and counter-espionage techniques
Students will learn critical thinking skills that will aid them in their counterintelligence operations
Students will be able to demonstrate a working knowledge of basic counterintelligence
Requirements
No necessary prerequisite
Description
Counterintelligence is an integral part of any comprehensive security program.

Counterintelligence activities are conducted to protect against espionage, sabotage, recruitment hostile organizations, or assassinations. Counterintelligence is often associated with intelligence agencies, government organizations or the military but businesses also benefit from including CI in their approach to security. In cybersecurity, counterintelligence is used to support the information security triad of Confidentiality, Availability, and Integrity (CIA). Many organizations practice aspects of CI, but refer to it by different names, including data loss prevention (DLP), malware reverse eeering and Network forensics.How counterintelligence worksCounterintelligence activities can be categorized as being either collective, defensive or offensive. Collective CI efforts focus on learning who the adversary is, how they collect information, what attack vectors they are targeting and what tools they are using. Defensive CI efforts focus on securing information and preventing an adversary from stealing or destroying it. Offensive CI activities focus on turning an attack into an opportunity to gain an advantage by using disinformation.While most information technology (IT) security administrators routinely conduct defensive CI and collective CI, the value of using offensive CI is not always understood. With the right implementation, deception technology can be used to improve collective, defensive and offensive CI. Deception technology uses decoys, such as honeypots and virtual honeypots, to misdirect an attack and delay or prevent the attacker from going deeper into the network and reaching the intended target. By observing the tactics, techniques and procedures attackers use in their attack, defenders can gain valuable insight that can be incorporated into their defenses. A custom certificate of completion will be available upon completion of this course.

Overview

Lecture 1 Welcome to the Counterintelligence Certification Crash Course

Section 1: Counterintelligence Crash Course

Lecture 2 Counter-Intelligence in history

Lecture 3 Counter-Intelligence Security: The Hawthorne Effect

Lecture 4 Security Counterintelligence: Keeping Secrets

Lecture 5 Counterintelligence: Baselining

Lecture 6 Security Counterintelligence: Situational Awareness

Lecture 7 Security CounterIntelligence: Surveillance Detection

Lecture 8 Security Counterintelligence: Information Warfare

Lecture 9 Security Counterintelligence: Canary Trap

Lecture 10 Security Counterintelligence: Lie Detection

Section 2: Final

Lecture 11 Conclusion and Final Assignment

Security professionals and security conscious individuals

HomePage:

Https://anonymz.com/https://www.udemy.com/course/counterintelligence-101-certificate-crash-course/




DOWNLOAD
1dl.net


uploadgig.com


rapidgator.net

High Speed Download

Add Comment

  • People and smileys emojis
    Animals and nature emojis
    Food and drinks emojis
    Activities emojis
    Travelling and places emojis
    Objects emojis
    Symbols emojis
    Flags emojis