Counterintelligence for Information Security Assessment and Protection (AUDT7200)

Rising Hands

Counterintelligence for Information Security Assessment and Protection

Description:

Gain an introduction to today’s threats (criminals, foreign intelligence services, terrorists, malicious code writers, hackers/hacktivists, and disgruntled employees) to sensitive and classified information, your employees, and your resources. Learn about the multifaceted threat that faces companies and agencies today, as well as tactics you can employ to combat it. Clearly understand the multifaceted threat to sensitive and classified information, resources, and personnel. Effectively articulate this threat to employees as part of your security education and training effort. This course is part of the Certified Government Auditor (CGA) program, Level 1 and Level 2.

Duration:

2 days

Level:

Intermediate

Who Should Attend?

Auditors, investigators and security professionals responsible for performing risk and control assessment of information, cyber and system security; as well officials who are responsible for monitoring, controlling, preventing, detecting and reporting potential and actual threats over secured and classified information uses, processes and assets.

Credits:

16 CPEs

Learning Outcomes:

  • Define the risks and threats associated with counterintelligence and information security.
  • Describe the roles and responsibilities of counterintelligence security personnel, and those charged with assessing and preventing risks associated with information.
  • Identify the potential sources of domestic and foreign threats to information security.
  • Explain the levels of information classification and required security.
  • Recognize indicators and conditions of internal threats as well as methods used for information theft and exploitation.
  • Apply counter measures and controls to increase awareness, prevention, detection and mitigation of threats.
  • Develop and apply procedures for reacting to, recording and reporting threats, suspicious activity and actual breaches.

Available Sessions:

Session Code Start Date End Date Location Tuition
Session Code AUDT7200-001 Start Date Jun 03, 2025 9:00 AM EST End Date Jun 04, 2025 5:00 PM EST Location Virtual Tuition $899.00

Register For Session

Session Code AUDT7200-002 Start Date Aug 12, 2025 9:00 AM EST End Date Aug 13, 2025 5:00 PM EST Location Virtual Tuition $899.00

Register For Session

Session Code AUDT7200-003 Start Date Sep 10, 2025 9:00 AM EST End Date Sep 11, 2025 5:00 PM EST Location Virtual Tuition $899.00

Register For Session

Session Code AUDT7200-004 Start Date Oct 22, 2025 9:00 AM EST End Date Oct 23, 2025 5:00 PM EST Location Virtual Tuition $899.00

Register For Session

Session Code AUDT7200-005 Start Date Dec 16, 2025 9:00 AM EST End Date Dec 17, 2025 5:00 PM EST Location Virtual Tuition $899.00

Register For Session

Bring This Class To My Location

  • Module 1 Counterintelligence
  • Module 2 Who is the Threat and What Do They Want?
  • Module 3 Domestic Terrorism and Domestic Violent Extremist (DVE’s) Groups
  • Module 4 Classified Information and Foreign Travel as a Clearance Holder
  • Module 5 The Cyber Threat and the Criminal/Terrorism Connection
  • Module 6 The Insider Threat
  • Module 7 Tools to Use in Counterintelligence

 

Other Recommended Courses:

Get in Touch!

questions icon

Have a Question?

We're here to help. Send us an email or call us at 1 (888) 744-4723