SlideShare a Scribd company logo
1 of 3
Intelligence Studies
Bachelor of Arts
The Bachelor of Arts in Intelligence Studies is designed to enhance your ability to research,
analyze, and convert data into clear and coherent intelligence. This online bachelor’s degree
focuses on national and international intelligence operations, analysis, ethics, collection methods,
research, and counterintelligence. This degree program is helpful if you are currently employed
in the intelligence field, or wish to pursue positions as military, civilian, or corporate intelligence
specialists.
Core courses in this program impart substantive knowledge and analytic skills required by all
professionals in the intelligence community, while the concentration choices enable you to focus
on a functional area or intelligence sub-field. This degree program is taught by highly
credentialed and experienced instructors, many who hold key positions in government agencies
or other intelligence organizations.
Program Courses
The curriculum for this online bachelor’s program is reviewed by an advisory council of industry
experts for relevancy to today’s marketplace. Depending on the concentration chosen, course
topics include:
 Research, analytics, and written communication
 Introduction to strategic intelligence
 Intelligence analysis and collection
 Intelligence techniques, including espionage and counterespionage
 Threat analysis
 Homeland security
 The U.S. and foreign intelligence communities
 Criminal intelligence, terrorism, and cyberwarfare
 Area studies for Asian, Latin American, or the Middle East
Program Objectives
In addition to the institutional and degree level learning objectives, graduates of this program are
expected to achieve these learning outcomes:
 Describe the evolution, structures, functions, capabilities, and activities of the U.S.
national intelligence community.
 Detail the structures, functions, capabilities, and contributions of national intelligence
consumers to include the national command authority, executive departments, Congress,
military services, joint/unified commands, and law enforcement agencies.
 Specify the intelligence cycle including intelligence planning, data collection, data
exploitation, analysis, production, and dissemination phases.
 Differentiate among the fundamental capabilities and limitations and means of tasking
human, geographic/imagery, signals, measurement and technical and open intelligence
data sources.
 Detail the current permissions and restrictions on U.S. national intelligence community
activities as prescribed by federal law, executive and agency directives, and the
intelligence oversight system.
 Conduct basic research and compose professional and academic analyses on issues
critical to intelligence consumers.
Cyber
Offers an overview of cyber warfare and the potential impact of its use by military, terrorist, and
criminal organizations, as well as the various methods of collection and analysis. Looks at the
use of strategic and operational level communications (COMINT) and electronics (ELINT)
intelligence. Topics also include the change in laws to account for crimes in the digital age.
Program: BA Intelligence Studies / Concentration: Cyber
CURRENT GPA: 3.8635 Program Deadline : 4/6/2024 Total SemesterHours Fulfilled :
103/121
Intelligence Studies Required Courses
 HLSS320 - Intelligence and Homeland Security A-
 INTL300 - Research Methods in Intelligence Studies A- 3/3
 INTL301 - U.S. Intelligence Community A 3/3
 INTL304 - Intelligence Collection A 3/3
 INTL305 - Law and Ethics in Intelligence A- 3/3
 INTL401 - Critical Analysis B+ 3
 INTL434 - Threat Analysis A 3/3
 INTL443 - Foreign Intelligence Organizations A 3/3
 INTL303 - Introduction to Intelligence A- 3/3
Concentration Requirements
 INTL421 - Signals Intelligence and Security A 3/3
 INTL422 - Open Source Collection A 3/3
 INTL440 - Cyber Warfare A 3/3
Must Take 18 Credits
 CMRJ201 - Criminal Justice Administration (Current Course) A 3/3
 ISSC341 - Introduction to Networking W, A- 3/3
 ISSC451 - Cybercrime (Current Course) A 3/3
 ITMG381 - Cyber Law and Privacy in a Digital Age A 3/3
 ISSC351 - Computer Forensics (Scheduled on 11/7/2016) 0/3
 ISSC452 - Cybersecurity (Scheduled on 11/7/2016) 0/3
Not taking
 ISSC422 - Information Security 0/3
 ISSC421 - Computer and Network Security 0/3

More Related Content

Viewers also liked

Viewers also liked (11)

Web 2.0 (1) (1)
Web 2.0 (1) (1)Web 2.0 (1) (1)
Web 2.0 (1) (1)
 
Ofimática online
Ofimática onlineOfimática online
Ofimática online
 
Abnt 05674
Abnt 05674Abnt 05674
Abnt 05674
 
April 2016
April 2016April 2016
April 2016
 
Receita de cachorro quente
Receita de cachorro quenteReceita de cachorro quente
Receita de cachorro quente
 
So good présentation
So good   présentationSo good   présentation
So good présentation
 
Whole Foods Wedding Oct 2016 pdf (1)
Whole Foods Wedding Oct 2016 pdf (1)Whole Foods Wedding Oct 2016 pdf (1)
Whole Foods Wedding Oct 2016 pdf (1)
 
Medialab Prado
Medialab PradoMedialab Prado
Medialab Prado
 
What is happening in payments industry
What is happening in payments industryWhat is happening in payments industry
What is happening in payments industry
 
European Banking Authority Guidelines on the Security of Internet Payments
European Banking Authority Guidelines on the Security of Internet PaymentsEuropean Banking Authority Guidelines on the Security of Internet Payments
European Banking Authority Guidelines on the Security of Internet Payments
 
SOMNIS
SOMNISSOMNIS
SOMNIS
 

Similar to Online BA Intelligence Studies with Cyber Concentration

Strong National Intelligence Communities Enhance National Security: The Role...
Strong  National Intelligence Communities Enhance National Security: The Role...Strong  National Intelligence Communities Enhance National Security: The Role...
Strong National Intelligence Communities Enhance National Security: The Role...gmoore22
 
Cyber Threat Intelligence Officer ODNI
Cyber Threat Intelligence Officer   ODNICyber Threat Intelligence Officer   ODNI
Cyber Threat Intelligence Officer ODNIDavid Sweigert
 
MSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalMSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalJohn Dunne
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
SIGINT Training Course, Signals Intelligence (SIGINT) Training Bootcamp
SIGINT Training Course, Signals Intelligence (SIGINT) Training Bootcamp  SIGINT Training Course, Signals Intelligence (SIGINT) Training Bootcamp
SIGINT Training Course, Signals Intelligence (SIGINT) Training Bootcamp Tonex
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docThowfeekFayees
 
CACI_JD for_DIA OCI-2 (CE Division)_RKB Quantico_1Apr15
CACI_JD for_DIA OCI-2 (CE Division)_RKB Quantico_1Apr15CACI_JD for_DIA OCI-2 (CE Division)_RKB Quantico_1Apr15
CACI_JD for_DIA OCI-2 (CE Division)_RKB Quantico_1Apr15Stephen Donahue
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
 
Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligenceIT2Alcorn
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWPICPE
 
Intelligence careers whitepaper student career resources
Intelligence careers whitepaper student career resourcesIntelligence careers whitepaper student career resources
Intelligence careers whitepaper student career resourcesLauren Harrison
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIIJCI JOURNAL
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...Willy Marroquin (WillyDevNET)
 
M.Sc. Forensic Sciences.pdf
M.Sc. Forensic Sciences.pdfM.Sc. Forensic Sciences.pdf
M.Sc. Forensic Sciences.pdfCollege49
 
M.Sc in Forensic Sciences Colleges in Noida
M.Sc in Forensic Sciences Colleges in NoidaM.Sc in Forensic Sciences Colleges in Noida
M.Sc in Forensic Sciences Colleges in NoidaGalgotias University
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 

Similar to Online BA Intelligence Studies with Cyber Concentration (20)

Strong National Intelligence Communities Enhance National Security: The Role...
Strong  National Intelligence Communities Enhance National Security: The Role...Strong  National Intelligence Communities Enhance National Security: The Role...
Strong National Intelligence Communities Enhance National Security: The Role...
 
Cyber Threat Intelligence Officer ODNI
Cyber Threat Intelligence Officer   ODNICyber Threat Intelligence Officer   ODNI
Cyber Threat Intelligence Officer ODNI
 
MSc Dissertation 11058374 Final
MSc Dissertation 11058374 FinalMSc Dissertation 11058374 Final
MSc Dissertation 11058374 Final
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
SIGINT Training Course, Signals Intelligence (SIGINT) Training Bootcamp
SIGINT Training Course, Signals Intelligence (SIGINT) Training Bootcamp  SIGINT Training Course, Signals Intelligence (SIGINT) Training Bootcamp
SIGINT Training Course, Signals Intelligence (SIGINT) Training Bootcamp
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
 
CACI_JD for_DIA OCI-2 (CE Division)_RKB Quantico_1Apr15
CACI_JD for_DIA OCI-2 (CE Division)_RKB Quantico_1Apr15CACI_JD for_DIA OCI-2 (CE Division)_RKB Quantico_1Apr15
CACI_JD for_DIA OCI-2 (CE Division)_RKB Quantico_1Apr15
 
Ctia course outline
Ctia course outlineCtia course outline
Ctia course outline
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)GFCE 2019 Presentation (Updated Nov 2019)
GFCE 2019 Presentation (Updated Nov 2019)
 
Eidws 112 intelligence
Eidws 112 intelligenceEidws 112 intelligence
Eidws 112 intelligence
 
Oig 15 55-mar15
Oig 15 55-mar15Oig 15 55-mar15
Oig 15 55-mar15
 
Webinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity RiskWebinar - Reducing Your Cybersecurity Risk
Webinar - Reducing Your Cybersecurity Risk
 
Intelligence careers whitepaper student career resources
Intelligence careers whitepaper student career resourcesIntelligence careers whitepaper student career resources
Intelligence careers whitepaper student career resources
 
Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AI
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
 
M.Sc. Forensic Sciences.pdf
M.Sc. Forensic Sciences.pdfM.Sc. Forensic Sciences.pdf
M.Sc. Forensic Sciences.pdf
 
M.Sc in Forensic Sciences Colleges in Noida
M.Sc in Forensic Sciences Colleges in NoidaM.Sc in Forensic Sciences Colleges in Noida
M.Sc in Forensic Sciences Colleges in Noida
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 

Online BA Intelligence Studies with Cyber Concentration

  • 1. Intelligence Studies Bachelor of Arts The Bachelor of Arts in Intelligence Studies is designed to enhance your ability to research, analyze, and convert data into clear and coherent intelligence. This online bachelor’s degree focuses on national and international intelligence operations, analysis, ethics, collection methods, research, and counterintelligence. This degree program is helpful if you are currently employed in the intelligence field, or wish to pursue positions as military, civilian, or corporate intelligence specialists. Core courses in this program impart substantive knowledge and analytic skills required by all professionals in the intelligence community, while the concentration choices enable you to focus on a functional area or intelligence sub-field. This degree program is taught by highly credentialed and experienced instructors, many who hold key positions in government agencies or other intelligence organizations. Program Courses The curriculum for this online bachelor’s program is reviewed by an advisory council of industry experts for relevancy to today’s marketplace. Depending on the concentration chosen, course topics include:  Research, analytics, and written communication  Introduction to strategic intelligence  Intelligence analysis and collection  Intelligence techniques, including espionage and counterespionage  Threat analysis  Homeland security  The U.S. and foreign intelligence communities  Criminal intelligence, terrorism, and cyberwarfare  Area studies for Asian, Latin American, or the Middle East
  • 2. Program Objectives In addition to the institutional and degree level learning objectives, graduates of this program are expected to achieve these learning outcomes:  Describe the evolution, structures, functions, capabilities, and activities of the U.S. national intelligence community.  Detail the structures, functions, capabilities, and contributions of national intelligence consumers to include the national command authority, executive departments, Congress, military services, joint/unified commands, and law enforcement agencies.  Specify the intelligence cycle including intelligence planning, data collection, data exploitation, analysis, production, and dissemination phases.  Differentiate among the fundamental capabilities and limitations and means of tasking human, geographic/imagery, signals, measurement and technical and open intelligence data sources.  Detail the current permissions and restrictions on U.S. national intelligence community activities as prescribed by federal law, executive and agency directives, and the intelligence oversight system.  Conduct basic research and compose professional and academic analyses on issues critical to intelligence consumers. Cyber Offers an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations, as well as the various methods of collection and analysis. Looks at the use of strategic and operational level communications (COMINT) and electronics (ELINT) intelligence. Topics also include the change in laws to account for crimes in the digital age.
  • 3. Program: BA Intelligence Studies / Concentration: Cyber CURRENT GPA: 3.8635 Program Deadline : 4/6/2024 Total SemesterHours Fulfilled : 103/121 Intelligence Studies Required Courses  HLSS320 - Intelligence and Homeland Security A-  INTL300 - Research Methods in Intelligence Studies A- 3/3  INTL301 - U.S. Intelligence Community A 3/3  INTL304 - Intelligence Collection A 3/3  INTL305 - Law and Ethics in Intelligence A- 3/3  INTL401 - Critical Analysis B+ 3  INTL434 - Threat Analysis A 3/3  INTL443 - Foreign Intelligence Organizations A 3/3  INTL303 - Introduction to Intelligence A- 3/3 Concentration Requirements  INTL421 - Signals Intelligence and Security A 3/3  INTL422 - Open Source Collection A 3/3  INTL440 - Cyber Warfare A 3/3 Must Take 18 Credits  CMRJ201 - Criminal Justice Administration (Current Course) A 3/3  ISSC341 - Introduction to Networking W, A- 3/3  ISSC451 - Cybercrime (Current Course) A 3/3  ITMG381 - Cyber Law and Privacy in a Digital Age A 3/3  ISSC351 - Computer Forensics (Scheduled on 11/7/2016) 0/3  ISSC452 - Cybersecurity (Scheduled on 11/7/2016) 0/3 Not taking  ISSC422 - Information Security 0/3  ISSC421 - Computer and Network Security 0/3