Certified Counterintelligence Specialist (CCIS) Certification Course by Tonex

Level I: Foundations of Cyber Threat Intelligence and Counterintelligence

Objective: Build foundational knowledge in cyber threat intelligence (CTI), basic counterintelligence (CI), threat actor analysis, and open-source intelligence (OSINT).

  1. Introduction to Cyber Threat Intelligence (CTI)
  • Understand the intelligence lifecycle: direction, collection, processing, analysis, dissemination, feedback
  • Difference between data, information, and intelligence
  • Types of CTI: strategic, operational, tactical, and technical
  1. Fundamentals of Counterintelligence
  • Definition and role of counterintelligence in cyberspace
  • Types of CI: defensive, offensive, and investigative CI
  • Common CI operations and objectives (denial, deception, disruption)
  1. Threat Actor Typologies
  • Nation-state actors (APT groups)
  • Cybercriminal organizations
  • Hacktivists
  • Insider threats
  • Understanding motivations: political, financial, ideological, personal
  1. OSINT and Data Collection
  • Legal and ethical OSINT collection practices
  • Tools: Maltego, Recon-ng, theHarvester, Shodan
  • Surface, Deep, and Dark Web distinctions
  • Social media intelligence (SOCMINT)
  1. Reporting and Communication
  • Intelligence report formats: Situation Reports (SITREPs), Intelligence Briefs, Threat Assessments
  • Writing for technical and non-technical audiences
  • CI terminology and structured analytic techniques (SATs): hypothesis testing, red teaming, indicators

Checkpoint Quiz and Lab:

  • Analyze a simple threat actor profile from open sources
  • Create a short intelligence brief based on OSINT

Level II: Applied Analysis, Attribution, and Threat Hunting

Objective: Apply analytic skills in cyber attribution, behavior-based profiling, and threat hunting techniques. Deepen integration of CI principles.

  1. Behavioral and TTP Analysis
  • MITRE ATT&CK and D3FEND frameworks
  • Diamond Model of Intrusion Analysis
  • Cyber Kill Chain
  • Indicators of Compromise (IoCs) vs. Indicators of Behavior (IoBs)
  1. Attribution and Adversary Profiling
  • Analytical methods to assess adversary origin and intent
  • Geo-political context and adversary capability assessment
  • Tradecraft: denial and deception techniques used by threat actors
  • OPSEC and counter-deception strategies
  1. Threat Hunting and Data Correlation
  • Proactive vs. reactive detection
  • Hypothesis-driven threat hunting
  • Leveraging SIEMs (e.g., Splunk, ELK), EDR tools (e.g., CrowdStrike, SentinelOne)
  • Correlating network, host, and user behavior data
  1. Insider Threats and Human Intelligence (HUMINT)
  • Psychological and behavioral indicators
  • Behavioral analytics in UEBA systems
  • Insider threat mitigation frameworks (e.g., NITTF)
  1. CI-Driven Incident Response
  • Role of CI analysts in IR teams
  • CI-based malware reverse engineering focus
  • Incident attribution vs. incident remediation

Practical Exercise:

  • Profile an APT using MITRE ATT&CK
  • Simulate a hunt mission using synthetic logs to detect anomalous behavior

Level III: Strategic Analysis, Operations, and Fusion Intelligence

Objective: Operate at a strategic level, fusing CI and CTI into actionable intelligence products supporting enterprise or national security missions.

  1. Strategic Intelligence and Risk
  • Nation-state threat assessments
  • CI contribution to enterprise risk management
  • Maturity models: CMMI, NIST CSF, MITRE CTID
  1. Cyber Counterintelligence Operations
  • Offensive CI operations in cyberspace (OCO)
  • Deception planning, honeypots/honeytokens
  • Counter-surveillance in cyberspace
  • Campaign-level adversary analysis
  1. Fusion Intelligence and Interagency Collaboration
  • Intelligence fusion centers and joint task forces
  • Data sharing platforms: DHS AIS, STIX/TAXII, InfraGard
  • Legal considerations and classification
  1. CI-Cyber Threat Briefing to Executives
  • Structured strategic briefings
  • Executive dashboards and risk scoring
  • Briefing DoD, DHS, or corporate boards
  1. Case Studies and Advanced Tradecraft
  • Dissect real-world CI/CTI campaigns: SolarWinds, Operation Aurora, etc.
  • Apply SATs to high-ambiguity situations
  • Predictive analysis and forecasting

Capstone Project:

  • Create a full-spectrum threat assessment report on a geopolitical actor
  • Develop a CI-informed mitigation plan for a simulated enterprise

Suggested Tools and Platforms to Practice

  • MITRE ATT&CK Navigator
  • MISP (Malware Information Sharing Platform)
  • Velociraptor or GRR for DFIR
  • YARA rules for malware profiling
  • OpenCTI platform

Career and Certification Pathways

  • Consider formal certifications:
    • CCTA (Level I-III by MCSI or equivalent bodies)
    • GCTI (SANS GIAC Cyber Threat Intelligence)
    • C|TIA (EC-Council Certified Threat Intelligence Analyst)
    • DoD 8570/8140-approved certs (e.g., CASP+, CISSP)
  • Clearance often required for CI roles in government
  • Build a portfolio: intelligence reports, threat profiles, hunt hypotheses

Want to learn more? Tonex offers Certified Counterintelligence Cyber Threat Analyst (CCTA I–III), a 2-day course where participants apply adversary-centric thinking to map campaigns, TTPs, and objectives as well as use structured analytic techniques to reduce bias and improve forecasts.

Attendees also produce clear, decision-oriented threat reports and briefings, integrate HUMINT/SIGINT with cyber telemetry for high-confidence judgments, lead and mature an intelligence program across CCTA I–III levels, and elevate cybersecurity outcomes by enabling earlier detection and targeted mitigation.

This course is especially beneficial for:

  • Cybersecurity Professionals
  • Threat Intelligence Analysts
  • SOC/IR Leads and Managers
  • Red/Blue/Purple Team Practitioners
  • Security Architects and Engineers
  • Government, Defense, and Critical Infrastructure Personnel

Tonex offers dozens of Certification Courses in a wide variety of topics.

Tonex has worked with industry organizations and clients to insure our Certification Courses are up-to-date and provide pragmatic training knowledge to insure immediate results from your certification experience.

We offer Tonex certifications that are recognized by our clients as valuable in insuring a consistent and thorough knowledge of the subject and how to apply that knowledge.

For more information, questions, comments, contact us.

Cyber Espionage & Counterintelligence (CECI)

 

Request More Information