This foundational course teaches students to analyze, prioritize, and fully understand requests for information (RFIs), and create a research plan that keeps their efforts on track.
Students will learn to uncover stakeholder intent so that their intelligence analysis can be actioned. They will gain the ability to fully interpret implicit and explicit RFIs by identifying relevant context from intelligence requirements, organizational threat profiles, and key stakeholder analysis.
They will also learn how to use a research management system to organize research and avoid information overload, and assess source relevance and trust to ensure efficient and focused collections efforts.
After completing this course, learners should be able to:
- Use a structured, repeatable four-step scoping process
- Generate context by referring to the organizational threat profile, key stakeholder analysis, and intelligence requirements (and how to proceed if these aren’t available)
- Prepare for collections efforts by developing a research management system
- Proactively assess different kinds of information and sources to avoid wasting time on irrelevant or unreliable sources
Who should attend
This is a foundational level course for cyber practitioners who must scope and respond to formal and informal requests for information (RFI’s).
Students should have taken Cyber Intelligence Foundations or have equivalent knowledge.
Content is available for 3 months from date of first login.
It can be accessed 24/7 from a standard web browser.