NOW ON-DEMAND! Learn from your computer, phone, or tablet! Anywhere, anytime!
What Students Will Learn
The end state of CSFI's unique Radicalization and Counter/Cyber Jihadist Operations Analyst (RCCJOA) training and certification is to support the warfighter, the intelligence community, U.S. military, and law enforcement to strategically defeat terrorist organizations and their affiliates through the use of cyberspace.
- The professional and academic discourse around radicalization with the intent to disrupt, isolate and dismantle terrorist organizations.
- How religious extremists use social media and social networks to recruit.
- The do's and do not's of government (including military) response to recruiting by religious extremists.
- How to read social media profiles of potential targets to understand the human terrain.
- The use of scripture by religious civil society to combat and suppress extremism.
- Final hands-on exercise lab and testing.
Testimonial
"Paul and Mubin recently taught the RCCJOA course at Novetta. I would highly recommend this course to gain a better understanding of Islam from its beginnings, radicalization, and hearing first-hand accounts from Mubin Shaikh who was key to taking down the Toronto-18. The end of the one-day course included hands-on training utilizing Maltego and performing analysis against Syrian Electronic Army-associated malware. Excellent training from two highly polished individuals. Thank you for coming to Novetta Paul and Mubin! It was an absolute pleasure meeting and speaking to you both, especially our chats after training had wrapped up." -Robert St. John, Technical Director, Novetta.
- World History and Islam 101
- Learn about the world from a macro-level to understand political & cultural contexts that shape our globe
- Learn about Islam specifically: origins, beliefs, empire expansion and contact with Christian Europe
- Terrorism from talk to action, The Toronto 18 Terror Plot
- See from a real-life example of a terrorist plot and how a group of youth moved from talk to action
- Notes and commentary on human intelligence operations in counter terrorism prosecutions
- Identifying vulnerable persons guide for LE: patrol officers, border control, analysts, operators and managers
- The A to Z of ISIS
- Recruiting of males, females and child soldiers, propaganda, incitement & attack methods etc.
- Discussion of the concept, "Terrorism in Islamic Costume" with extensive references to Islamic Scriptures
- Catalog of ISIS attacks: how to learn from past incidents
- Red Team Exercise
- Malware Analysis Hands-On Lab (OSINT techniques) - Syrian Electronic Army (SEA)Tactics, Techniques, and Procedures (TTPs).
- "Terrorists employ the Internet for recruiting, training, motivating, and synchronizing their followers. The enemy frequently operates essentially unrestrained and is free to innovate and exploit its potential. Cyberspace provides new and important means and methods to collect and process large amounts of information on the local populace and insurgents."
- Joint Pub 3-26 Counterterrorism
- The end state of CSFI's unique Radicalization and Counter/Cyber Jihadist Operations Analyst (RCCJOA) training and certification is to support the warfighter, the intelligence community, and law enforcement to strategically defeat terrorist organizations and their affiliates and adherents through the use of cyberspace.
RCCJOA live training in Quantico, Virginia
Special thanks to the Cyber Bytes Foundation for hosting the RCCJOA training event
Notice
CSFI screens all applications and will not allow any applicant whose name appears on the U.S. Department of the Treasury’s Office of Foreign Asset Controls (OFAC) Specially Designated Nationals (SDN) List or on OFAC’s Consolidated List to enroll in a CSFI-sponsored course. CSFI holds the right to deny any application without further explanation.