1601 Broadway, New York, NY 10019 B1 TRAINING
May 09, 2018 10:00 AM - 04:00 PM(America/New_York)
20180509T1000 20180509T1600 America/New_York Radicalization and Counter/Cyber Terrorist Operations Analyst   What Students Will Learn The professional and academic discourse around radicalization with the intent to disrupt, isolate and dismantle terrorist organizations. How religious extremists use social media and social networks to recruit. The do's and do not's of government (including military) response to recruiting by religious extremists. How to read social media profiles of potential targets to understand the human terrain. The use of scripture by religious civil society to combat and suppress extremism. Final hands-on exercise lab and testing. Notice

CSFI screens all applications and will not allow any applicant whose name appears on the U.S. Department of the Treasury’s Office of Foreign Asset Controls (OFAC) Specially Designated Nationals (SDN) List or on OFAC’s Consolidated List to enroll in a CSFI-sponsored course.

Course Outline "Terrorists employ the Internet for recruiting, training, motivating, and synchronizing their followers. The enemy frequently operates essentially unrestrained and is free to innovate and exploit its potential. Cyberspace provides new and important means and methods to collect and process large amounts of information on the local populace and insurgents." Joint Pub 3-26 Counterterrorism The end state of CSFI's unique Radicalization and Counter/Cyber Jihadist Operations Analyst (RCCJOA) training and certification is to support the warfighter, the intelligence community, and law enforcement to strategically defeat terrorist organizations and their affiliates and adherents through the use of cyberspace.
1601 Broadway, New York, NY 10019 B1 HACK NYC 2018 events@magegroupe.com
8 attendees saved this session

Terror1

 

What Students Will Learn

  • The professional and academic discourse around radicalization with the intent to disrupt, isolate and dismantle terrorist organizations.
  • How religious extremists use social media and social networks to recruit.
  • The do's and do not's of government (including military) response to recruiting by religious extremists.
  • How to read social media profiles of potential targets to understand the human terrain.
  • The use of scripture by religious civil society to combat and suppress extremism.
  • Final hands-on exercise lab and testing.
  • Notice

    CSFI screens all applications and will not allow any applicant whose name appears on the U.S. Department of the Treasury’s Office of Foreign Asset Controls (OFAC) Specially Designated Nationals (SDN) List or on OFAC’s Consolidated List to enroll in a CSFI-sponsored course.

    Course Outline

    • "Terrorists employ the Internet for recruiting, training, motivating, and synchronizing their followers. The enemy frequently operates essentially unrestrained and is free to innovate and exploit its potential. Cyberspace provides new and important means and methods to collect and process large amounts of information on the local populace and insurgents."
    • Joint Pub 3-26 Counterterrorism
    • The end state of CSFI's unique Radicalization and Counter/Cyber Jihadist Operations Analyst (RCCJOA) training and certification is to support the warfighter, the intelligence community, and law enforcement to strategically defeat terrorist organizations and their affiliates and adherents through the use of cyberspace.
Radicalization and Counter/Cyber Jihadist Operations Analyst (RCCJOA) Instructor
,
Cyber Security Forum Initiative
Founder Director President at Cyber Security Forum Initiative
,
Cyber Security Forum Initiative
No moderator for this session!
Attendees public profile is disabled.
Upcoming Sessions
228 visits

FAQ

 Code of Conduct  Press Releases
 Get Involved   Report ISSUE / BUG
Tickets  

The Critical Infrastructure Association of America, Inc. is a 501(c)6 Not for Profit. The mission of Critical Infrastructure Association of America is to create a membership-based, trade association of like-minded cybersecurity and closely related industry professionals that work in the field of cybersecurity. The goal is to share best practices, establish and maintain high operational standards and to educate and interact with those in the cybersecurity community within public, private and governmental sectors.