Description:
Gain an introduction to today’s threats (criminals, foreign intelligence services, terrorists, malicious code writers, hackers/hacktivists, and disgruntled employees) to sensitive and classified information, your employees, and your resources. Learn about the multifaceted threat that faces companies and agencies today, as well as tactics you can employ to combat it. Clearly understand the multifaceted threat to sensitive and classified information, resources, and personnel. Effectively articulate this threat to employees as part of your security education and training effort. This course is part of the Certified Government Auditor (CGA) program, Level 1 and Level 2.
Duration:
2 days
Level:
Intermediate
Who Should Attend?
Auditors, investigators and security professionals responsible for performing risk and control assessment of information, cyber and system security; as well officials who are responsible for monitoring, controlling, preventing, detecting and reporting potential and actual threats over secured and classified information uses, processes and assets.
Credits:
16 CPEsLearning Outcomes:
- Define the risks and threats associated with counterintelligence and information security.
- Describe the roles and responsibilities of counterintelligence security personnel, and those charged with assessing and preventing risks associated with information.
- Identify the potential sources of domestic and foreign threats to information security.
- Explain the levels of information classification and required security.
- Recognize indicators and conditions of internal threats as well as methods used for information theft and exploitation.
- Apply counter measures and controls to increase awareness, prevention, detection and mitigation of threats.
- Develop and apply procedures for reacting to, recording and reporting threats, suspicious activity and actual breaches.
Available Sessions:
Session Code | Start Date | End Date | Location | Tuition | |
---|---|---|---|---|---|
Session Code AUDT7200-001 | Start Date Jun 03, 2025 9:00 AM EST | End Date Jun 04, 2025 5:00 PM EST | Location Virtual | Tuition $899.00 | |
Session Code AUDT7200-002 | Start Date Aug 12, 2025 9:00 AM EST | End Date Aug 13, 2025 5:00 PM EST | Location Virtual | Tuition $899.00 | |
Session Code AUDT7200-003 | Start Date Sep 10, 2025 9:00 AM EST | End Date Sep 11, 2025 5:00 PM EST | Location Virtual | Tuition $899.00 | |
Session Code AUDT7200-004 | Start Date Oct 22, 2025 9:00 AM EST | End Date Oct 23, 2025 5:00 PM EST | Location Virtual | Tuition $899.00 | |
Session Code AUDT7200-005 | Start Date Dec 16, 2025 9:00 AM EST | End Date Dec 17, 2025 5:00 PM EST | Location Virtual | Tuition $899.00 |
- Module 1 Counterintelligence
- Module 2 Who is the Threat and What Do They Want?
- Module 3 Domestic Terrorism and Domestic Violent Extremist (DVE’s) Groups
- Module 4 Classified Information and Foreign Travel as a Clearance Holder
- Module 5 The Cyber Threat and the Criminal/Terrorism Connection
- Module 6 The Insider Threat
- Module 7 Tools to Use in Counterintelligence
Other Recommended Courses:
- Manager's and Auditor's Roles in Assessing Internal Control (AUDT8003)
- Information Technology for Auditors (AUDT8024)
- Information Systems Auditing (AUDT8029)
- Detection and Prevention of Fraud (AUDT8004)