Counterintelligence for Information Security Assessment and Protection (AUDT7200)

Counterintelligence for Information Security Assessment and Protection

Counterintelligence for Information Security Assessment and Protection


Gain an introduction to today’s threats (criminals, foreign intelligence services, terrorists, malicious code writers, hackers/hacktivists, and disgruntled employees) to sensitive and classified information, your employees, and your resources. Learn about the multifaceted threat that companies and agencies face today, as well as tactics you can employ to combat it. Clearly understand the multifaceted threat to sensitive and classified information, resources, and personnel. Effectively articulate this threat to employees as part of your security education and training effort.

Who Should Attend?

Auditors, investigators and security professionals responsible for performing risk and control assessment of information, cyber and system security; as well officials who are responsible for monitoring, controlling, preventing, detecting and reporting potential and actual threats over secured and classified information uses, processes and assets.




16.0 CPE's

Class Type:

This course is currently being offered in the following training modalities:

Learning Outcomes:

  • Define the risks and threats associated with counterintelligence and information security
  • Describe the roles and responsibilities of counterintelligence security personnel, and those charged with assessing and preventing risks associated with information
  • Identify the potential sources of domestic and foreign threats to information security
  • Explain the levels of information classification and required security
  • Recognize indicators and conditions of internal threats as well as methods used for information theft and exploitation
  • Apply counter measures and controls to increase awareness, prevention, detection and mitigation of threats
  • Develop and apply procedures for reacting to, recording and reporting threats, suspicious activity and actual breaches

Register For Online Course


Bring This Class To My Location

Module 1: Counterintelligence

Module 2: Who is the Threat and What Do They Want?

Module 3: Domestic Terrorism

Module 4: Classified Information

Module 5: Foreign Travel

Module 6: The Cyber Threat and the Criminal/Terrorism Connection

Module 7: The Insider Threat(s) and Their Motivations

Module 8: Case Studies

Module 9: Tools to Use in Counterterrorism

Module 10: Signs and Indicators from the Insider Threat

Module 11: Methods and Techniques Used By the Threat

Module 12: Mitigating the Efforts of the Threat (Countermeasures)

Module 13: Reporting Suspicious Activities

Module 14: Reporting Foreign Intelligence Contacts, Activities, Indicators and Behaviors

Module 15: It Pays To Catch a Spy

Module 16: Implementing Change

Module 17: Government Resources for Threat Information

Module 18: Some Closing Thoughts to Ponder

Get in Touch!

questions icon

Have a Question?

We're here to help. Send us an email or call us at 1 (888) 744-4723