A 4-course sequence in the area of Intelligence Analysis prepares students to protect national security and national interests abroad by developing skills related to federal and law enforcement strategies.
As part of these courses, real-world examples are used to frame the content and application of classes. Practice and application of methods and tools used for intelligence analysis are integrated into courses. (12-16 Hours)
Why choose the Cyber Intelligence Analyst Certificate Program?
Do you like technology? Do you have an interest in intelligence gathering and operations? Would you like a good paying job where you can make a difference and protect the country at the same time? If you answered yes, then the Cyber Intelligence Analyst Program will provide you with a solid foundation to begin preparing for a career in that field.
Prepare for careers in the Department of Defense (DOD) and the intelligence community (IC) and within Federal, State and Local Law Enforcement Agencies. Careers include Intelligence Operations, Intelligence Analysis (in multiple disciplines), Federal Disaster Agencies (FEMA), Cyber and Network Protection, sworn field agents, State and Local Law Enforcement Officers. An example of some agencies that students can expect to find employment in are the FBI, DEA, NSA, CIA, DIA, ATF, DHS, NGA, ICE and DOD.
Job Outlook and Industry Highlights:
Individuals with the skills learned in this course will have a solid analytical foundation and be on their way to finding employment in many different areas of the intelligence community, from local and State Law Enforcement to military contracting or Government civilians working within the Federal agencies previously mentioned.
The job market is continually growing in the field of cyber analysis and the demand for trained analysts is expected to grow by as much as 20% through 2018 according to the U.S. Bureau of Labor Statistics. The Washington Post reports a critical need to fill 50,000 cyber security jobs in the near future within the federal government and the private sector.The average annual salary is about $75,000 according to recent reports from the Department.
Understand and execute multiple disciplines in the Intelligence Community with an emphasis on Signals Intelligence. Learn current intelligence methods and asymmetric techniques used within the Federal, State, and Local Intelligence Communities. Gain experience in interpreting intelligence reports and counter intelligence tactics and learn the proper application of Operational Security. National priority target sets and real-life intelligence gathering scenarios are included in the analyst certificate program. Instruction and practical exercises will focus on a wide variety of military and law enforcement target sets. Students will be exposed to several analytical tools, techniques, and products which are currently being used in the Federal, State and local intelligence community.
A Certificate of Completion from the Cyber Intelligence Analyst Program will be awarded upon successful completion of the program. The following topics will be studied:
- Operational Security
- Intelligence Process
- Cyber Threats and Infrastructure
- Computer Network Operations CNO, Computer Network Attack CNA, Computer Network Defense CND, and Computer Network Exploitation CNE.
- Target Area Assessment
- Basic Intelligence Analysis Techniques
- Human Intelligence Fundamentals (HUMINT)
- Signals Intelligence Fundamentals (SIGINT)
- Geospatial Intelligence Fundamentals (GEOINT)
- Open Source Intelligence Fundamentals (OSINT)
- Central Intelligence Agency (CIA) Strategies
- Federal Bureau of Investigation (FBI) Strategies
- National Security Agency (NSA) Strategies
- National Geospatial Agency (NGA) Intelligence Strategies
- Defense Intelligence Agency (DIA) Strategies
- United States’ Military Intelligence Strategies
How to Register
If you are already a degree- or non-degree seeking student at UWF:
- Register for EME3991 via UWF's normal student registration process inMyUWF. The course section is not permission-coded, so you can register yourself.
If you are not currently a UWF student:
- Apply to UWF as a non-degree seeking student.
- There is no application fee.
- Once your application is reviewed and approved by Admissions (1-3 working days), you will receive an email from Admissions that includes your new UWF ID number.
- Go to MyUWF and activate you university account.
- As a prerequisite to registration, all students must submit the Mandatory Immunization Health History Form to satisfy the University's immunization requirements for face-to-face courses.
- Information on these requirements for measles/mumps/rubella (MMR) as well hepatitis and meningitis can be found at: http://www.uwf.edu/healthcenter/Immrequirements.cfm
- For students under the age of 18 years, the Mandatory Immunization Health History Form must be signed by the student's parent or guardian.
- Include your UWF ID number with any immunization documentation or related forms you submit. That will speed up the review process.
- The best way to submit the Mandatory Immunization Health History Form with immunization documentation is to email them to firstname.lastname@example.org.
- Once you are accepted as a non-degree seeking student and the immunization requirements are met, register yourself for EME3991, Introduction to Intelligence Analysis via MyUWF.
- Pay the course tuition before the start date. Payment is made via the University's normal tuition payment process through the Cashier's office.
If you run into problems with this registration, please contact Genene Poppell at email@example.com for assistance.
Explain relationships of intelligence-related organizations that work within the signals intelligence arena
Define professional concepts, including intelligence, intelligence analysis, geospatial analysis, and social network analysis
Develop comprehensive plans to include thread identification and prioritization
Describe the intelligence cycle
Analyze scenarios based on data protocols, using data analysis strategies and techniques to frame analysis and reports
Collect, research, and analyze data
Evaluate significance and reliability of data
Create written and analytical reports for clients
Use technology to facilitate communication, analysis, and reporting
Analyze ethical issues in intelligence analysis
Identify ethical issues related to intelligence analysis in an organization
Articulate the responsibilities of an intelligence analysis professional
Employ effective project management skills to develop an analysis plan, as well as monitor and track work products
Work as part of a team in the intelligence analysis and information dissemination process
EME 3991 Introduction to Intelligence Analysis (3)
Designed for those individuals who might be interested in entering the local, state, or federal intelligence community, foundational knowledge of analytic concepts, partners involved, and their respective functions is explored. Examination of multiple federal agencies, including the Central Intelligence Agency, Federal Bureau of Investigations, Drug Enforcement Administration, Department of Homeland Security, National Security Agency, National Reconnaissance Office, National Geospatial-Intelligence Agency, Defense Intelligence Agency, and each military service-specific intelligence organization. Concept of information sharing between the local, state, and federal level intelligence organizations are explored. Overview of Human Intelligence, Signals Intelligence, Geospatial Intelligence, Imagery Intelligence, Measurements and Signatures Intelligence, Open Source Intelligence and All-Source Intelligence. Foreign intelligence threats and existing methods that can be employed to counter them are investigated. Key problems faced by the Intelligence Analyst are reviewed.
EME 399x Introduction to Intelligence Disciplines (3)
An in depth examination of the five major intelligence disciplines: Human Intelligence, Signals Intelligence, Geospatial Intelligence, Open Source Intelligence, and Measurements and Signatures Intelligence in addition the concept of combining intelligence into an all-source formatted product. The concepts of Information Security and its offensive counterpart, Computer Network Operations are explored. Using real-life scenarios, students analyze strategies to achieve various end goals. From infiltrating a network of foreign spies, to developing a suspect's placement in a network based off of their call patterns, to assessing the technical capabilities of an adversary nation, students will be immersed in a variety of practical exercises where they will be asked to perform various types of analysis themselves. In addition, students will produce clear, concise, and accurate products for dissemination. Students will explain the general flow of information within an intelligence product and associated components.
EME 499x Geospatial Analysis (3)
Functions of geospatial toolsets, including setting up the workspace, manipulating imagery and adding various data-files, importing raw data from spreadsheets, reading data as a table, and creating features. Different methods of data manipulation will be examined. Students will create professional products that can be used by analysts of all backgrounds. Students will use raw data for the analysis process.
EME 499x Social Network Analysis (3)
Social network analysis toolsets will be used to develop skills in integrating analytic disciplines and methods through real world scenarios by reading, creating, and manipulating SNA charts. Data sets will include class-generated content as well as large spreadsheets, where data will be manipulated through filters and conditional formatting, and using basic algorithms to analyze their data and locate patterns and trends. Interpretation of raw data and product generation using tables and charts, students will develop skills in reading, interpreting, and presenting findings.
GIS 4043 Geographic Information Systems (3)
Spatial database will be queried to solve spatial problems, analyze related attributes, and produce computerized cartographic output. Examines spatial data structures, data acquisition, processing, management, manipulation, and analysis for interdisciplinary applications and research. Permission is required.
GIS 4043L GIS Laboratory (1)
Lab correlating with GIS 4043. Intended to be a fundamental lab that provides hands-on experience operating a GIS.