March 13, 2015 www.atichcd.org 2 0 1 5 Training Catalog Advanced Technical Intelligence Center for Human Capital Development 2685 Hibiscus Way, Suite 110 Beavercreek, Ohio 45431 (937) 429-7601 [email protected] OSBCCS Certificate Number: 1978 © ATIC HCD, 2015-2016. All rights reserved. Welcome to ATIC In trod uction Dear Students, Welcome to the Advanced Technical Intelligence Center for Human Capital Development. Along with our web site, this Training Catalog provides information you will need during your studies here at ATIC. We provide high-quality and up-to-date training which the Intelligence Community demands. Our courses are taught by leading scholars and practitioners in their respective fields, so your work here will be challenging but rewarding. Most importantly, the training you receive at ATIC is recognized across the Defense and Intelligence Communities for its relevance and rigor. ATIC graduates are performing critical analytic functions throughout the community, across industry and government, and we are looking forward to helping you join their ranks. Please feel free to contact me at [email protected] if you have any questions regarding your program. We want your time at ATIC to go as smoothly as possible, so please do not hesitate to ask questions. Again, welcome to ATIC and I look forward to working with you. Sincerely, Cassie Barlow, Ph.D. Executive Director 1 P a r t n e r i n g – C u l t i v at i n g - A n al yzi n g A n al Table of Contents ATIC Overview ........................................................................................................................................ 4 Vision, Mission, Strategy & Values ......................................................................................................... 5 Nondiscrimination Statement ................................................................................................................ 5 License and Recognition ......................................................................................................................... 6 Administration ........................................................................................................................................ 6 Board of Trustees ............................................................................................................................... 6 Officers ............................................................................................................................................... 7 Facilities .................................................................................................................................................. 7 Equipment .............................................................................................................................................. 8 Payment and Refund .............................................................................................................................. 8 Refund Policy ...................................................................................................................................... 7 Security Clearance .............................................................................................................................. 9 Academic Calendar ................................................................................................................................. 9 Class Schedule and Holidays............................................................................................................... 9 Analyst Boot Camp (ABC) 2015 Program Dates ................................................................................. 9 Cyber Analysis Data Security (CADS) 2015 Program Dates .............................................................. 10 Standards of Conduct ........................................................................................................................... 10 Conditions of Dismissal for Unsatisfactory Conduct ........................................................................ 10 Policy for Granting Credit for Previous Education and Training....................................................... 10 Administrative and Academic Policies ................................................................................................. 11 Grading ............................................................................................................................................. 11 Graduation Requirement ................................................................................................................. 11 Analyst Boot Camp Program Overview ................................................................................................ 11 Admission ......................................................................................................................................... 12 Intelligence Community Orientation Course .................................................................................... 12 Cyber Analysis Data Security Program Overview ................................................................................. 12 CADS Admission................................................................................................................................ 12 Intelligence Analysis Course Descriptions ............................................................................................ 13 ABC Core Courses ............................................................................................................................. 13 2 Technical Applications in Intelligence Courses................................................................................. 18 Intelligence and Analysis Software Courses ..................................................................................... 24 Cyber Security and Analysis Courses ................................................................................................ 25 CADS Core Courses ........................................................................................................................... 25 “Short” Courses .................................................................................................................................... 29 Industry Partner Training and Education Courses ............................................................................ 29 ATIC Training Intermediate and Advanced Courses ......................................................................... 29 Professional Development ................................................................................................................... 30 Principal Faculty ................................................................................................................................... 30 Adjunct Faculty ..................................................................................................................................... 31 Tuition and Fees ................................................................................................................................... 34 Grievance Procedure ............................................................................................................................ 34 3 ATIC Overview Headquartered in Dayton Ohio, the Advanced Technical Intelligence Center for Human Capital Development (ATIC) is an independent 501(c)(3) not-for-profit organization established to help address critical human capital and technological development needs within the US Intelligence Community (IC) and related industries. The primary mission of ATIC is to educate and train a workforce of appropriately cleared government and contractor personnel capable of generating actionable information from technical intelligence systems. ATIC currently supports workforce development in the areas of technical intelligence analysis, cyber security, and law enforcement analysis. ATIC also provides a multi-level security environment to support collaborative research, development, test and evaluation of advanced analytic tools, techniques, and methodologies particularly in the area of enhancing human performance. The original vision for ATIC grew out of a need to fill open intelligence analyst positions in the Dayton Region and throughout the U.S. Intelligence Community. Critical shortfalls in that area were becoming increasingly evident due to an aging workforce, fewer U.S. citizens receiving science and technology degrees, and changing threats to our nation. Today, ATIC is directly associated with Wright State University Research Institute, and continues to collaborate with government, industry, and academia. In return, ATIC offers access to a trained, cleared workforce, support for continuing education requirements, secure facilities for ongoing operations, and managed research and development programs. Support of ATIC's mission and collaboration with its stakeholders bring value to the Dayton region and to the intelligence and national security missions of the United States. These collaborative efforts highlight the capabilities of the Dayton region to a national audience. 4 Vision, Mission, Strategy & Values Our VISION To be the recognized national leader in the discipline of Analytic Tradecraft. We educate and train analysts in the intelligence discipline to better prepare leaders for any operational environment. Our MISSION Create value by partnering with government, industry and academia in cultivating all-source and cyber analysts for the intelligence and law enforcement communities. Our STRATEGY – Leverage synergistic outcomes across three Centers: along with the Aerospace Professional Development Center, and Regional STEM Collaborative Center ATIC meets the aerospace and defense industry’s dynamic workforce needs, through high-quality programs of instruction, research, studies, and specialized support focused on Intelligence, cyber and law enforcement. Our VALUES – Integrity — Honor in our behavior Commitment — Honor in our agreements Cooperation — Honor in our partnerships Nondiscrimination Statement ATIC does not discriminate against any student or applicant because of race, color, religion, sex (including pregnancy and gender identity), national origin, political affiliation, sexual orientation, marital status, disability, genetic information, age, membership in an employee organization, retaliation, parental status, military service, or other non-merit factor.. This policy shall include, but 5 not be limited to, the following: admission policies, scholarship and loan programs, or other ATIC- administered programs. License and Recognition The Advanced Technical Intelligence Center for Human Capital Development is licensed by the Ohio State Board of Career Colleges and Schools (Registration No. 12-01-1978T). ATIC’s Analyst Boot Camp Certificate Program meets the provisions of Chapter 3332 of the Ohio Revised Code, meeting the standards, rules and regulations of the Board. The Analyst Boot Camp in Dayton (Beavercreek), Ohio is approved for Veterans’ Benefits under the GI Bill. Qualified veterans may be eligible to use GI Bill benefits to offset the cost of training. VA Benefits may vary. Always consult with your VA counselor. More information is available at www.gibill.va.gov. The Advanced Technical Intelligence Center is a member of the Department of Defense Intelligence Training and Education Board (DITEB), a governmental steering group under the direction of the Undersecretary of Defense for Intelligence to monitor and enhance certification and professional development in intelligence training and education activities. Administration Board of Trustees Dr. David Hopkins, Chairman Wright State University Mr. Gary O’Connell USAF Retired, Senior Executive Mr. Dennis Andersh CEO, Wright State Research Institute Mr. John Landess Executive Director, The Turner Foundation Mr. Hugh K. Bolton Senior Fellow, Wright State University Mr. William Dungey Capt (Ret) USAF, Air Force Civil Service Member Mr. Michael Bridges Peerless Technologies, Corp. 6 Mr. Mike Gearhardt Vice President, JBK Manufacturing and Development, Co. President & CEO, Dayton Development Coalition Dr. S. Narayanan Wright State University Mr. Jeffrey Hoagland Officers Dr. David Hopkins – Chairman of the board Dr. Cassie Barlow, Col (Ret), USAF – Executive Director Dr. Timothy Shaw, Special Agent (Ret), FBI – SVP & Director of Operations Mr. Mike Gearhardt – Treasurer Ms. Beverly Shillito – Secretary Facilities The ATIC main campus facility is located at 2685 Hibiscus Way in Beavercreek, Ohio and includes over 38,000 square feet of instructional and administrative space at the Unclassified, Secret Collateral, and Top Secret/SCI levels. The ATIC facility consists of: 7 dedicated classrooms capable of hosting over 250 students simultaneously; All classrooms can be easily converted to additional computer lab space using ATIC’s portable laptop classroom 3 dedicated computer labs capable of hosting 50 students simultaneously and providing high-speed Internet access along with the latest analytical software packages A Center for Law Enforcement Analysis and Training (CLEAT) that enables students to work on analysis issues affecting law enforcement agencies A Situational Awareness Lab (SAL) where students can hone their skills on real-world intelligence data A Cyber Analysis Research Lab (CARL) where students can apply cyber security skills A 259-seat secure auditorium for graduations and special events Student breakout rooms, work areas, library, and lounge area Administrative and faculty offices The ATIC Learning Center is located at 4170 Allium Court in Springfield, OH. The Learning Center houses advanced information technology infrastructure and lab spaces to support ATIC’s cyber security training activities, as well as commercialization of cyber technology research and development. This facility is available to rent. 1 Equipment In our dedicated computer labs ATIC has 38 high capacity HP desktop computers with dual monitors to maximize data visualization. We also have 47 HP laptop computers that can be utilized to turn any classroom into a computer lab. All desktop and laptop computers have Microsoft Office® products and Internet access. Additional software packages available for student use and instruction include: ArcGIS® MATLAB® AutoCAD® OPTICKS® ENVI® Oracle® SOCET GXP® Systems Tool Kit® Google Earth® Payment and Refund Students are encouraged to pay the entire tuition for ATIC training programs by the first day of term one of the programs. For programs over 300 contact hours, students have the option to pay 50% of the tuition by the first day of term one. Students making a partial payment are only permitted to attend through the end of term one (i.e., 50% of the program). The remaining 50% of the tuition is due by the first day of the second term to continue in the program. No student will be able to start the first day of term one of the program without having paid at least 50% of the tuition. No student will be able to start the first day of term two of the program without having paid 100% of the tuition. Refund Policy Students who withdraw from the program before the first day of class are eligible for a refund of 100% of their paid tuition. 7 A student who starts class and withdraws or is dismissed before the academic term is 15% complete will be obligated for 25% of the tuition for the current academic term. ATIC will provide all deadlines for payment on the first day of class. A student who starts class and withdraws or is dismissed after the academic term is 15% complete but before the academic term is 25% complete will be obligated for 50% of the tuition for the current academic term. ATIC will provide all deadlines for payment on the first day of class. A student who starts class and withdraws or is dismissed after the academic term is 25% complete but before the academic term is 40% complete will be obligated for 75% of the tuition for the current academic term. ATIC will provide all deadlines for payment on the first day of class. A student who starts class and withdraws or is dismissed after the academic term is 40% complete will not be entitled to a refund of the tuition for the current academic term. ATIC will provide all deadlines for payment on the first day of class. Security Clearance Any student who fails to pay 100% of the tuition by the first day of the second term or withdraws from the program before the last day of the second term will not be eligible to continue the security clearance process. ATIC will cancel the sponsorship of the student's security clearance. Academic Calendar Full time ATIC classes meet 8 hours per day, Monday through Friday from 8:30am to 4:30pm, including a one hour lunch break. Part time or evening classes generally meet 4 hours per day, Monday through Friday from 5:30pm to 9:30pm. Class Schedule and Holidays The ATIC facility is open Monday through Friday from 7:30am to 10:00pm. Saturday hours are also available on an as-needed basis. ATIC is closed on Sundays and the following holidays: Martin Luther King, Jr. Day (19 Jan) Memorial Day (25 May) Independence Day (4 Jul) Labor Day (7 Sep) Thanksgiving (25-26 Nov) Christmas (24-25 Dec) New Year’s Day (1 Jan 2016) Analyst Boot Camp (ABC) 2015 Program Dates 8 Dayton, OH (with classes held at ATIC Main Campus in Beavercreek, OH) Spring: Summer: Fall: 12 January to 20 March 2015 (enroll by 29 Dec 14) 18 May to 24 July 2015 (enroll by 4 May 15) 8 September to 13 November 2015 (enroll by 25 Aug 15) Classes within the boot camp may be taken on an individual basis. Interested students should refer to the website or contact ATIC for scheduling and tuition information. Cyber Analysis Data Security (CADS) 2015 Program Dates Springfield, OH (with classes held at the ATIC Learning Center, Springfield, OH) Spring: Summer: Fall: 12 January to 20 March 2015 (enroll by 29 Dec 14) 18 May to 24 July 2015 (enroll by 4 may 15) 8 September to 13 November 2015 (enroll by 25 Aug 15) Standards of Conduct All students at ATIC are expected to conduct themselves with the highest standards of professional conduct and ethics at all times. Behavior that is disruptive, unethical, illegal, threatening, or destructive will not be tolerated. Students who fail to follow these Standards of Conduct will be dismissed from training, and their application for a security clearance will be withdrawn. All students must understand and abide by the written Standards of Conduct for Students policy. Students will sign and acknowledge the policy guidance on the first day of class. Conditions of Dismissal for Unsatisfactory Conduct The Executive Director of ATIC has the authority to dismiss any student who violates ATIC’s published policies. ATIC will maintain a permanent record of the expulsion in the student’s file. Policy for Granting Credit for Previous Education and Training The Director of Training will evaluate official transcripts and documentation of previous education and training current within the last three years, and determine if any credit will be given to the student for previous work completed. 10 Administrative and Academic Policies Grading Students are assessed using a combination of scores and grades for some activities and on a Pass/Fail basis for participation in other activities. A passing grade is defined as meeting 75% or more of the objectives for any given exercise, assignment, or examination. Students will receive weekly written and oral feedback on their progress. If students score less than 75% on a training activity, they may request three days to re-accomplish and submit the training activity. Graduation Requirement Students must successfully complete 90% of the courses and be present for at least 90% of the entire program to receive a program certificate. If a student does not meet the program certificate requirements they will be issued individual certificates for each of the classes they successfully completed. Transcripts Students and alumni considered in good standing may request an official ATIC transcript. Requests must be made in writing via letter and must include the student’s signature. A transcript request form is available on the ATIC website. Additional administrative and academic policies are provided during student orientation. Analyst Boot Camp Program Overview The Analyst Boot Camp (ABC) is a rigorous 10-week program designed to provide students with the necessary tools to be successful analysts in the Intelligence Community (IC). Throughout the program students will be regularly challenged with analytic exercises as well as writing and briefing assignments on current intelligence issues. The program requires U.S. citizenship and eligibility for a security clearance. Upon completion of the ABC, students with no previous intelligence experience may be qualified for entry level-positions in the intelligence workforce with government organizations, private industry, or academia. Courses begin at the unclassified level and transition as students gain their security clearances. The Analyst Boot Camp includes 400 hours of instructional time including 232 hours of Core Foundation Analytic Skills coursework and 168 hours of Intelligence Discipline/Tradecraft courses including analytic software tools. Course titles and descriptions are in this catalog. 11 Admission Minimum requirements for acceptance to the Analyst Boot Camp include all of the following: Complete ABC Application Submit resume Successful admission interview At least 20 years of age as of the first day of class (Proof of date of birth includes Driver’s License, State-Issued ID, Birth Certificate, or Passport) U.S. citizenship (Proof of U.S. citizenship includes Passport, Birth Certificate, Naturalization Certificate, DHS Form I-9, or DD Form 1966) ATIC reserves the right to request proof of the following documents if applicable: Honorable Discharge or General Discharge Under Honorable Conditions (i.e., DD214) High School Completion Transcripts from any/all education and training Intelligence Community Orientation Course Students may elect to take only the first half (five weeks) of the Analyst Boot Camp, to familiarize them with the fundamental structure and components of the Intelligence Community. Students who satisfactorily complete the five week course will receive a Certificate of Training in Intelligence Community Orientation. The cost of this course is3$4,997.50. Cyber Analysis Data Security Program Overview The CADS is an intensive 10-week training program designed to prepare students for careers as Cyber Security Analysts. The curriculum offers a direct learning experience to the student through a virtual environment and content. Students will learn by doing, discovering and exploring cyber security and data analysis in an experiential learning environment. Throughout the program students will be regularly challenged with hands-on analytic and cyber security exercises. Upon successful completion of the CADS, students with no prior cyber security experience may be qualified for entry-level positions in the cyber security workforce with government organizations, private industry, or academia. Course titles and descriptions are in this catalog. CADS Admission Minimum requirements for acceptance to the CADS include all of the following: Complete CADS Application Submit resume Successful admission interview 12 At least 18 years of age as of the first day of class Successful completion of criminal background check Security+ Certification (or equivalent demonstrated ability) Network+ Certification (or equivalent demonstrated ability) Bachelor’s degree is preferred, but not required ATIC reserves the right to request proof of the following documents if applicable: Honorable Discharge or General Discharge Under Honorable Conditions (i.e., DD214) High School Completion Transcripts from any/all education and training Intelligence Analysis Course Descriptions Theory Lab Total Hours Introduction to the Intelligence Community (IC) 24 0 24 Operational Security (OPSEC) 8 0 8 History of the Intelligence Community 8 0 8 Legal and Ethical Issues in Intelligence 8 0 8 Open Source Intelligence (OSINT) Analysis 4 4 8 How to Think Like an Analyst 8 16 24 Counterintelligence 8 0 8 Intro to Intelligence, Surveillance, & Reconnaissance 8 0 8 How to Write Like an Analyst 16 8 24 How to Brief Like an Analyst 8 16 24 Human Intelligence (HUMINT) Analysis 8 0 8 Signals Intelligence (SIGINT) Analysis 8 0 8 Imagery Intelligence (IMINT) Analysis 4 4 8 Geospatial Intelligence (GEOINT) Analysis Measurement and Signature Intelligence (MASINT) Analysis 4 4 8 8 0 8 Mid Term Briefing Capstone Exercises and Final Briefings 0 0 16 40 16 40 Course 13 ABC Core Courses ICO 1011 Introduction to the Intelligence Community (IC) Introduction to the Intelligence Community introduces the historical development of the U.S. Intelligence Community and its current construct. The course reviews the major events that shaped the IC from the American Revolution to the present day. Discussions include the effectiveness of the IC in different historical circumstances and evaluation of future reform efforts. ICO 1011 History of the Intelligence Community The History of the Intelligence Community course introduces the historical development of the U.S. Intelligence Community. The course reviews the major events that shaped the IC from the American Revolution to the present day. Discussions include the effectiveness of the IC in different historical circumstances and evaluation of future reform efforts. This course covers the major forces that continue to influence U.S. intelligence policy. ICO 1091Law and Ethics in Intelligence Legal and Ethical Issues in Intelligence introduces the key elements of the legal framework underlying the activities of the Intelligence Community. This course provides an understanding of the abuses within the IC and the resultant reforms. Ethical concerns surrounding intelligence activities are discussed and analyzed. ICO 1023 Open Source Intelligence (OSINT) Analysis Open Source Intelligence (OSINT) Analysis is an exploration of the vast array of publicly available source material available to analysts in newspapers, videos, and journals, primarily via the Internet. This course provides an overview of the necessary tools to effectively search, acquire, and analyze data to meet an intelligence need. ICO 1043 How to Think Like an Analyst How to Think Like an Analyst is an introduction to critical thinking. Students will learn why critical and creative thinking are important to intelligence analysis and the problem solving process. Students will learn to apply eight elements of thought to critically evaluate a written 14 product. Students will be able to describe intellectual standards and how they apply to intelligence analysis. This course introduces structured analytic techniques - some widely used in the private sector and academia, some unique to the intelligence profession. ICO 2011 Counterintelligence The Counterintelligence (CI) course introduces the role of counterintelligence as an essential element of U.S. National Security Strategy and explains the fundamental elements of CI. This course covers the National Counterintelligence Strategy of the U.S., the fundamental elements of the Counterintelligence discipline, and the Foreign Threat Overview. The threat overview includes industrial, economic, and traditional espionage threats with a particular focus on the Chinese CI threat to U.S. interests. ICO 1001 Operational Security (OPSEC) Introduction to Operational Security will introduce the student to the threat to the analytical world by a number of adversaries. This course will teach the student the simple and effective methods to protect information and secrets. The number of ways to collect information from an individual, company or nation has grown and the level of exposure has grown as well. This course will touch on how the adversary will try and collect the “pieces of the puzzle” for exploitation. ICO 1023 How to Write Like an Analyst How to Write Like an Analyst provides an understanding of analytical writing including its various concepts and tools. This course is designed to be relevant to the broad spectrum of intelligence problems that a professional analytical writer will face. Students gain a fundamental knowledge of technical writing, research methodology, and commonly used search tools to develop the core of a Body of Knowledge (BOK) for intelligence production. Students learn the differences between academic and technical writing. Students will practice writing using the “industry” standards called Intelligence Community Directives set forth by the Office of the Director of National Intelligence (ODNI). 15 ICO 1033 How to Brief Like an Analyst How to Brief Like an Analyst provides an introduction to the presentation skills and research methods commonly used to develop intelligence products. This course covers basic concepts, including a background survey on the processes used for briefing intelligence topics, as well as adherence to community of practice standards required by the Office of the Director of National Intelligence (ODNI). Students learn how to construct and execute a presentation (briefing) composed of sourced technical intelligence. How to Brief Like an Analyst presents a broad spectrum of briefing topics and situations that analyst may face as an intelligence professional. This course provides an exploration of how specific techniques and decision rules can be used to help maximize reliability of finished intelligence products. ICO 3021 Human Intelligence (HUMINT) Analysis Human Intelligence (HUMINT) Analysis provides an understanding of the specialized intelligence discipline that relies on human assets to provide information to our national and military decision-makers. This course comprehensively examines the HUMINT discipline from its collection methods, types, legalities, techniques, and especially analytical considerations, while emphasizing the importance of HUMINT. ICO 3061 Signals Intelligence (SIGINT) Analysis The Signals Intelligence (SIGINT) Analysis course is an introduction to the technical intelligence collection discipline that involves intercepting signals emitted from a variety of sources, including communications intelligence (COMINT), electronic intelligence (ELINT) and foreign instrumentation signals intelligence (FISINT). This course includes an overview of other disciplines such as cryptography and traffic analysis as they relate to SIGINT. ICO 3041 Imagery Intelligence (IMINT) Analysis Imagery Intelligence (IMINT) Analysis provides an introduction to the basics of imagery intelligence analysis and its many uses throughout the Intelligence Community. This course provides an understanding of airborne tactical collection platforms such as Global Hawk, Predator, and the U-2 (which utilize Synthetic Aperture Radar/SAR, Infrared Imagery/IR, and Electro-Optical/EO sensors to collect imagery). Imagery Intelligence Analysis explains the relationship between IMINT and other technical data collection sources including SAR MASINT (Measurement and Signatures Intelligence) and LADAR (laser detection and ranging). ICO 3051 Geospatial Intelligence (GEOINT) Analysis 16 Geospatial Intelligence (GEOINT) Analysis traces the history of GEOINT from its earliest incarnations using scouts and maps in the American Civil War to the current state-of-the-art satellites and sophisticated overhead surveillance platforms that capture imagery and video in real-time. This course is a broad look at GEOINT. Geospatial Intelligence (GEOINT) Analysis demonstrates how GEOINT adds value to intelligence products. This course delves deeper into the way GEOINT is specifically used at NASIC to enhance products sent to current warfighters. ICO 3031 Measurement and Signature Intelligence (MASINT) Analysis The Measurement and Signature Intelligence (MASINT) Analysis course includes introduction to the six sub-disciplines covered under Measurement and Signature Intelligence (MASINT), which are Electro-Optical (e.g. Light Detection and Ranging – LIDAR), Radio Frequency (e.g. Unintentional Radiated Emissions, Directed Energy Weapons), Materials (Chemical, Biological, Radiological, Nuclear and Explosives – CBRNE); Radar (Bistatic, over-the-horizon, and line-ofsight – description only) Geophysical (magnetic, acoustic, gravimetric); and Nuclear Radiation. ICO 5012 Mid Term Briefing The Mid-Term Briefing is a practicum course for the first half of the Analyst Boot Camp. This experience enables the students to utilize skills learned during the first five weeks to compile and produce a comprehensive current intelligence product. Students present the product to a panel of intelligence experts. ICO 5015 Applied Analytic Skills Applied Analytic Skills is the capstone course for the Analyst Boot Camp. This experience focuses on the utilization of previous coursework to compile and produce a comprehensive intelligence product. Students present the product to a panel of intelligence experts. 17 Technical Applications in Intelligence Courses Theory Lab Total Hours Introduction to Terrorism 8 0 8 Introduction to Cyber Threat 8 0 8 Order of Battle Analysis 8 0 8 Order of Battle Analysis Lab Introduction to Intelligence, Surveillance, and Reconnaissance (ISR) 0 8 8 8 0 8 Introduction to Radar 8 0 8 Overhead Persistent Infrared (OPIR) 8 0 8 Synthetic Aperture Radar (SAR) 8 0 8 Thermal IR Analysis 8 0 8 Spectral Analysis 8 0 8 Multi- and Hyper-spectral Imaging Analysis 8 0 8 Introduction to Systems Tool Kit 8 0 8 Course 18 Chemical and Biological Weapons 8 0 8 Radiological and Nuclear Weapons 8 0 8 Introduction to Space Analysis 8 0 8 Integrated Air Defense Systems (IADS) 8 0 8 Electronic Warfare 8 0 8 Introduction to GIS Analysis-ArcGIC 16 0 16 Introduction to Network Analysis with Lumify 16 0 16 HLS 1011 Introduction to Terrorism The Introduction to Terrorism course provides students with the foundational knowledge for further terrorism studies. The course explains the definitions of terrorism and differentiates between terrorism and other forms of violence. A brief history of terrorism is provided along with an explanation of the different motivations for terrorist violence. This course surveys a wide range of existing terrorist groups, examines certain high-profile themes (e.g., statesponsored terrorism, suicide terrorism, and CBRN terrorism), and assesses the nature of the threat terrorists pose to U.S. national security as well as the current status of the Global War on Terrorism (GWOT). CYB 1051 Introduction to the Cyber Threat Introduction to the Cyber Threat presents an overview of the basics of cyber security and threat awareness pertaining to networks, companies, and government organizations. Perpetrators include: organized crime, individuals, and both state and non-state actors seeking to disrupt systems and profit financially. 19 OOB 1012 Order of Battle Analysis Order of Battle Analysis introduces the term Order of Battle (OoB) and explains what it means, the elements that constitute an OoB, and the origins of the OoB concept. This course provides a fundamental understanding of the utility of analyzing an adversary from an OoB perspective and how this approach differs from a simple disposition of forces approach. The U.S. OoB will be used to highlight various OoB components and as an example to demonstrate the entire OoB concept. Top level treatment of Foreign OoB will be presented to show the similarities and differences between the types and complexities of countries OoB. OOB 1012 Order of Battle Analysis Lab The Order of Battle Analysis Lab applies the lessons learned in the prerequisite Order of Battle courses. Students present the capabilities of assigned countries in hypothetical match-ups between potential adversaries, analyze their Order of Battle, and assess likely outcomes. ICO 1103 Introduction to Intelligence, Surveillance, and Reconnaissance (ISR) Introduction to ISR surveys the electromagnetic spectrum, platforms, applications, visible and infrared sensor data collection techniques, radar collection techniques, and other technical issues. Various sensor types are explored in terms of current sensors grouped by altitude, regime, capabilities and applications, TCPED (Tasking, Collection, Processing, Exploitation, and Distribution) agencies, sensor trends, and planned future systems. GEO 1012 Introduction to Radar The Introduction to Radar course presents the practical application of radar phenomenology and technology needed to achieve the performance seen in modern radar. This course familiarizes students with the capabilities and limitations of radar, and the performance and implementation of its critical sub-systems. GEO 1031 Overhead Persistent Infrared (OPIR) 20 The Overhead Persistent Infrared (OPIR) course presents an introduction to OPIR with the AllSource Analyst in mind. This course provides a basic understanding of the capabilities of the systems and how they relate in the production of an intelligence product. GEO 1012 Synthetic Aperture Radar (SAR) Synthetic Aperture Radar (SAR) introduces the fundamental principles of SAR and its use in Advanced Geospatial Intelligence (AGI). Topics include: basic radar operation, SAR data collection, SAR scene generation, SAR AGI products (Coherent Change Detection, Digital Elevation Models, Dynamic Imaging), creation of SAR AGI products, and the limitations of SAR. This course provides an overview of the identification of the intelligence products which could be requested from a SAR system and under what conditions they would be appropriate. GEO 1041 Thermal IR Analysis The Thermal Infrared Analysis course provides an overview of the development of IR analysis as well as the uses and implementation of IR analysis today. This course covers the capabilities and limitations of remote sensing, radiation theory, satellite-based sensors, airborne-based sensors, and associated terminology. STW 1021 Introduction to Systems Tool Kit Introduction to Systems Tool Kit familiarizes first-time users with the STK workflow. Topics include: modeling objects and a basic understanding of STK software suite capabilities. GEO 1051 Spectral Analysis The Spectral Analysis course delves into the core of Advanced Geospatial Intelligence: advanced sensors and analysis techniques applied to detection and discrimination. This course provides an understanding of how spectral data is used in today's intelligence world. HLS 2021 Chemical and Biological Weapons The Chemical and Biological Weapons course provides an overview of the historical use of CWAs by both state and non-state actors, the different types of chemical warfare agents 21 (CWAs), their effects, the equipment, infrastructure, procedures, and resources required to produce and effectively dissemination CW agents. HLS 3011 Radiological and Nuclear Weapons The Radiological and Nuclear Weapons course will provide students a basic understanding on a variety of topics ranging from basic physics of nuclear radiation, uses of nuclear materials, nuclear power plants, the nuclear fuel cycle for power plants, organizations regulating nuclear energy, basic descriptions of radiological and nuclear weapons, various delivery systems, and the effects of radiological and nuclear weapons. SPM 1011 Introduction to Space Analysis The Introduction to Space course provides the fundamentals of astro-dynamics and concepts of space system employment and operation through discussions of orbital mechanics, space environment, space vehicles, launch vehicles, space data transmission, satellite TPED (Transmission, Processing, Exploitation, Dissemination), command and control of space assets, and space policy. This course provides a short history of space developments, what physics concepts apply, an overview of how U.S. space operations work, and what policies, international treaties, and other rules apply to space. SPM 1081 Integrated Air Defense Systems (IADS) This course of instruction will provide the students with an understanding of the origins of Integrated Air Defense Systems (IADS) and how these systems work to defend critical air space. Students will understand the components of an IADS and how they work relating to the aspects of air defense systems integration. ICO 2071 Electronic Warfare This course covers Electronic Warfare (EW) at an introductory level. The student will understand the objectives of EW, how it is divided into various sub-disciplines, and US tenants for the employment of EW in military operations. Students will learn the history of EW from World War One through the current day. The student will understand how an EW system is designed with specific attention to antennas and receiver. The course then covers modern means of electronic attack such as jamming, decoys, and antiradiation weapons. STW 1032 Introduction to GIS Analysis Introduction to GIS Analysis teaches the range of functionality available in the ArcGIS Desktop software and the essential tools for visualizing, creating, managing, and analyzing geographic data. The hands-on course exercises emphasize practice with ArcMap and ArcCatalog (the 22 primary applications included with ArcGIS Desktop software) to perform common GIS tasks and workflows. STW 1013Introduction to Network Analysis with LUMIFY Introduction to LUMIFY presents an overview of LUMIFY, which is an information analysis platform used to integrate, visualize and analyze data of all kinds for the intelligence, defense and law enforcement communities. This course provides an opportunity for hands on exercises to import and model data, perform search and discovery exercises against this data and employ techniques to define and test hypotheses within a multi-dimensional environment. Additional topics include: exploring hidden patterns/connections, testing hypotheses, and fundamental knowledge of ontologies. 23 Intelligence and Analysis Software Courses Course Full Motion Video (FMV) Analysis Theory 16 Lab 24 Total Hours 40 Introduction to GIS Analysis 4 12 16 Advanced GIS Analysis 4 20 24 Introduction to Systems Tool Kit 0 8 8 Full Motion Video (FMV) Analysis The Full Motion Video (FMV) Analysis Certificate course introduces the FMV analysis process and explores how FMV fits into the larger intelligence cycle. This course offers significant hands-on experience analyzing FMV data, working with relevant software tools, and creating intelligence products. This course presents the unique challenges faced by FMV analyst and discusses the future of FMV analysis. Introduction to GIS Analysis Introduction to GIS Analysis teaches the range of functionality available in the ArcGIS Desktop software and the essential tools for visualizing, creating, managing, and analyzing geographic data. The hands-on course exercises emphasize practice with ArcMap and ArcCatalog (the primary applications included with ArcGIS Desktop software) to perform common GIS tasks and workflows. Advanced GIS Analysis The Advanced GIS Analysis course provides a detailed understanding of intelligence processes using the Military Analyst and Spatial Analyst extensions for ArcGIS. This course covers the skills required to create, manage, organize, and edit geo-processing applications, utilize geoprocessing tools to analyze data, and create final products ready for dissemination applied to real world situations. Introduction to Systems Tool Kit (STK) Introduction to Systems Tool Kit familiarizes first-time users with the STK workflow. Topics include: modeling objects and a basic understanding of STK software suite capabilities. 24 Cyber Security and Analysis Courses Course Theory Lab Total Hours CYB 1001 Review of Networking Concepts 6 6 12 CYB 1002 Intro to Network Security Monitoring 8 20 28 CYB 1003a Intro to Theory of an Attack 12 12 24 CYB 1003b Intro to Hacking Tools 12 12 24 CYB 1004 Intro to Packet Analysis 12 28 40 CYB 1005 Intermediate Network Security Monitoring 12 28 40 CYB 1006 Intro to Sandboxing and Malware Analysis 12 28 40 CYB 1007 How to Think Like a Cyber Analyst 24 0 24 12 0 12 0 120 120 0 36 36 CYB 1008 Intro to Legal and Ethical Aspects of Cyber Security CYB 1009 Network Security Monitoring - Lab in Practice CYB 1010 Capstone Project 25 CADS Core Courses CYB 1001 Review of Networking Concepts This course will provide a comprehensive review of basic networking, relating to Security+ and Network+ concepts. This course will strengthen the student proficiency in functionality and traffic flow of data across networks as it pertains to LAN and WAN communication. Students will construct a classroom network that will be used through the rest of the course. Lab Students will construct a virtual computer and install operating systems using different types of media, to include ISO’s, bootable USB and CD/DVD. CYB 1002 Introduction to Network Security Monitoring This course will provide students with an overview of network security monitoring. Students will discuss and recognize several tool sets utilized to determine intrusions across communication networks. Student s will be introduced to the concept of sensors and their role within the network security monitoring framework. Lab Applying the skills learned in Network Security Monitoring students will construct initial NSM sensors to be used throughout the rest of the course. Students will develop knowledge and training about placement of sensors and taps within a virtual network. CYB 1003a Introduction to Theory of an Attack It is important to know your enemy. This course will provide students with general attack theory and insight into the mind of an attacker. Students will recognize the different types of attackers, their motivations and some of the tools they use including the Backtrack Suite and Scripting languages. Lab: Building on the skills learned in CYB103a and b, students will begin to use and demonstrate about the Operating Systems created in the CYB101 Lab, their environments and perform navigation and system management through basic operating systems commands. Students will then apply Backtrack suite and practice some initial attacks on operating systems. Students will use the knowledge learned about the Python scripting language in CYB103b and begin to write their own offensive and defensive tools. 26 CYB 1003b Introduction to Hacking tools This course takes the student through the systems and operating systems that are being attacked. Students will gain knowledge about vulnerabilities for specific operating systems and features built into operating systems in order to protect them. Students will also learn basic commands used in Linux and Windows allowing them to become comfortable navigating in these environments. Students will also be introduced to the Python Scripting language, its uses in both offensive and defensive postures. Lab: Students will demonstrate the use of those tools on the operating systems and VM environment. Students will be separated into teams and presented with an attack scenario of which one team will be required to determine how they would attack that system while the other team will be required to determine how they would protect the same system. CYB 1004 Introduction to Packet Analysis Students will be introduced to the idea of the network data packet, how packets are constructed, the different types of packets and different ways that packets can be manipulated. Students will gain insight into the tools that are used to capture and view packets and how those tools can be used for packet analysis. Students will be introduced to the TCP/IP stack and packet flow as it relates to specific operating systems. Lab: Students demonstrate with the packet capture tools learned about in “Walking the packet” and begin capturing packets on their VM Hosts. Students will also begin to analyze packet data flows, identify information held within and rebuild the packet flows into visual readable data. The intent of this lab is to begin to allow the students to feel comfortable with the construction of data and how it is read. CYB 1005 Intermediate Network Security Monitoring Students will be taken through the different facets of the Security Onion Framework, the tools available in the framework and how to use them together in order to monitor traffic on a network. Students will be introduced to the Bro Scripting Language, how it can be used to detect anomalies on the wire. Lab: Students will demonstrate an understanding of the Bro Language and write their first scripts. They will operate the Security Onion framework to analyze network traffic and determine attack vectors. 27 CYB 1006 Introduction to Sandboxing and Malware Analysis Students will be introduced to the concept of sandboxing and how it allows for analysis of malware in a safe, controlled environment. Students will discover how malware works, performs and be introduced into how to determine what malware is doing from sandbox reporting. Lab: Students will spend time sandboxing specific malware, analyzing data gained in the sandboxing process and then use that data to write scripts which are designed to detect the malware involved as it passes through a network. Students will test their scripts using their NSM Sensors on live network traffic. CYB 1007 How to Think Like a Cyber Analyst This course will be a series of lectures covering specific skill sets an Analyst must possess to be a successful analyst. Students will learn how their role as an analyst fits into the overall Defensive strategy. They will learn how to react to incidents, how to report on incidents, who to inform of an attack or an impending attack and how to interact with law enforcement. Students will hear from a guest speaker in the law enforcement community as one of the segments in this course. CYB 1008 Introduction to Legal and Ethical aspects of Cyber Security Students will be introduced to the different aspects of how legal issues fall into their day to day roles. Students will identify what they can and can’t do as it relates to tracking an attacker. Students will also distinguish how the nature of NSM has a fine line in the debate of individual privacy. CYB 1009 Network Security Monitoring - LAB in Practice This course will be a three week intensive lab use of the tools and skills learned throughout the CADS curriculum. Students will have a significant amount of time to move their knowledge of NSM from the beginner analyst to a more substantial intermediate foundation. Students will heavily demonstrate the use of Python and Bro Scripting language, the NSM sensors and the NSM toolkit introduced to the students throughout the course. 28 CYB 1010 Capstone Students will be given real world network designs and scenarios in which fictitious companies need to design, build, and implement NSM security architecture. Students will demonstrate the deployment of sensors, what tools were used and why; students will also present network topologies and sample execute scenarios against targeted training data. Students present the results of their findings in the scenario to a panel of cyber and intelligence experts. “Short” Courses Industry Partner Training and Education Courses ATIC partners with defense intelligence, industry, and academia to host programs of interest to the Professional Intelligence Workforce throughout the year. Topics, content, and offerings vary, and are available on the ATIC website. ATIC Training Intermediate and Advanced Courses In addition to the formal ABC and CADS, ATIC presents intermediate and advanced-level courses on topics of interest to the Professional Intelligence Workforce. Short courses range from a day to several weeks, and are added throughout the year with up-to-date offerings, information, and registration available on the ATIC website. Currently scheduled courses include: Introduction to Imagery Intelligence The introduction to Imagery Analysis course is a three week overview of Imagery Intelligence (IMINT) analysis tools and techniques. Students are introduced to information and skills necessary to perform basic level IMINT analysis and production tasks. Throughout the course, students will be regularly challenged with application exercises to evaluate and reinforce their comprehension of the material and their understanding of the role of an Imagery Analyst (IA) on the integrated IMINT operations team, and in enterprise operations. 29 Intermediate Imagery Intelligence Analysis Course The Intermediate Imagery Analysis Course is a three week course designed to build on the fundamentals of Imagery Intelligence (IMINT) taught in the Introduction to Imagery Analysis Course. The intermediate class expands upon the role of IMINT analysis in intelligence support to military, civilian, and humanitarian for planners and decision makers. The course focuses on collection and exploitation planning, remote sensing systems and enhancements, IMINT reporting, organization and equipment categorization concepts, multi-intelligence fusion, and the development of product libraries and databases. Professional Development ATIC hosts Professional Development events for working Intelligence Professionals. Events include noted speakers, brown-bag lunches with panels of industry leaders presenting on timely intelligence, and professional networking social events. Each autumn, ATIC hosts its Cleared Career Fair, where qualified job seekers holding a verified government security clearance can meet directly with industry and government organization representatives. Mixing dozens of employers and hundreds of job seekers, this event continues to grow in popularity each year and is open to any cleared professional. More information is available on these classes and all professional development activities on the ATIC website. Principal Faculty Mr. John Hermes is the Cyber Systems Security Administrator. He is a multi-platform technologist, educator and systems designer experienced in software development, information security and enterprise IT. Mr. Hermes holds h a B.S. in Computer Science from Wright State University. He teaches the ATIC Cyber Analysis Data Security (CADS) courses. Dr. James Mainord is the Assistant Vice President for Strategic Development for ATIC. He has extensive experience in corporate leadership and business development, and holds a BA in Political Science from Brigham Young University and Juris Doctor from the University Of Dayton School Of Law. Dr. John O'Hair is ATIC’s Chief Scientist. He has more than 28 years of experience in engineering and intelligence analysis with the U.S. Air Force and private industry. Dr. O'Hair holds a PhD in Electrical Engineering from the Air Force Institute of Technology (AFIT). 30 Dr. Timothy Shaw is the Vice President for Strategic Development and Director of University Relations at ATIC. He is the former Dean of the School of Criminal Justice and Social Sciences at Tiffin University and is a retired Special Agent with the Federal Bureau of Investigation. He holds a Juris Doctor from Ohio Northern University. Adjunct Faculty ATIC utilizes adjunct faculty drawn from government, military, academic, and industry organizations with extensive operational experience. These practitioners bring valuable insights to the classroom and provide students with real-world practical knowledge. Full biographies of adjunct instructors are available on the ATIC website. Mr. Scott Bethel (Brig Gen, USAF, ret.) retired in 2013 as Vice Commander of the Air Force Intelligence, Surveillance and Reconnaissance Agency. He previously commanded intelligence units at the squadron, group, and wing levels, and was Director of Strategy, Integration and Doctrine and Deputy Chief of Staff for ISR at Headquarters U.S. Air Force. Mr. Bethel is currently a senior executive in industry. He holds an MS in Strategic Intelligence from the National Intelligence University, and was a National Defense Fellow at Boston University. Dr. Robert Clark is professor of intelligence studies at the University of Maryland University College. He served in the USAF as an electronic warfare officer and intelligence officer; in CIA as an analyst and group chief; and was president and CEO of the Scientific and Technical Analysis Corporation (STAC) from 1984 to 1999. Dr. Clark’s books include Intelligence Analysis: A Targetcentric Approach and The Technical Collection of Intelligence. He holds a Ph.D. in Electrical Engineering from the University of Illinois and a J.D. from George Washington University. Mr. Chris Earnhardt has over 15 years’ experience in program management and intelligence analysis, including over six years as a technical intelligence analyst in private industry. He holds a BS from Clemson University and an MS in Information Resource Management from the Air Force Institute of Technology, and is a certified Project Management Professional. Mr. Brian Gold is an acquisition intelligence analyst with the US Air Force, and political-military intelligence analyst with the US Navy Reserve. He holds a BA from Cleveland State University, a Master of Military Operational Art and Science from the Air Command and Staff College, and a JD from the University of Akron School Of Law. Mr. Gordon Issler has over 27 years’ experience in intelligence with the US Air Force and industry. He is currently an executive managing intelligence programs in private industry. He holds Master’s Degree in National Security Strategy, Military Operational Art and Science, and Management. 31 Dr. James Jacobs teaches at the Keck School of Medicine at the University of Southern California. He was a Visiting Scholar in the Office of the Chief Medical Officer at the US Department of Homeland Security. Dr. Jacobs received the Ph.D. in biomedical engineering from the University of Alabama at Birmingham and the M.D. from Duke University. He is Board certified in emergency medicine and is a Fellow of the American College of Emergency Physicians. Mr. Dan Lewandowski has 30 years’ experience in intelligence, management and space operations. He holds four Master’s Degrees in Organizational Management, Space Systems, Military Operational Art and Science, and Strategic Studies. Mr. Michael Martini is an Intelligence Analyst with over 23 years of engineering and intelligence analysis experience supporting the U.S. Air Force and private industry. He holds an MS in Systems Engineering from the Naval Post Graduate School. Ms. Nicole Parrish has 10 years’ experience in geospatial technologies and analysis with private industry. She holds a BS in Geographic Information Systems from Ohio University, and an MS in Criminal Justice from Tiffin University. She is also a graduate of the joint ATIC/Clark State Community College certificate program in Wide Area Airborne Surveillance and Analysis. Mr. Kerry Taylor is the Director of the Aerospace Hub at the University of Dayton Research Institute and a retired U.S. Air Force intelligence officer. He holds an MS in Strategic Studies from the Air War College. Mr. Tom Coyle has spent ten years as a National Security consultant, supporting the Office of the Secretary of Defense (OSD) and later the Office of the Director of National Intelligence (ODNI)… For several years Mr. Coyle served as a senior Instructor at the Dept. of Defense’s Joint Counterintelligence Training Academy (JCITA), where he trained military and civilian agents in two flagship courses. In 2012, Mr. Coyle supported the US Army's Provost Marshal General as his National Security advisor at the Pentagon. Dr. Kent Schlussel has over 35 years of experience in engineering development and intelligence analysis with the U.S. Air Force, Defense Intelligence Agency, and the U.S. Army. Dr. Schlussel holds a PhD in Applied Mathematics from the University of Virginia. Mr. Tom Brannon, US Marine Corps Retired, is a 24-year Marine Corps veteran. He taught International Politics and National Security Policy at the University of West Florida He flew the F-4 Phantom as a Radar Intercept Officer and is a graduate of US Navy Fighter Weapons School (Topgun) and the US Marine Corps Weapons and Tactics Instructor Course. Tom served for four years on the Defense Intelligence Agency staff where he wrote special intelligence analysis for two Presidents, three Secretaries of Defense and gave classified intelligence presentations to committees of Congress and the White House Situation Room. 32 Mr. James Miklasevich Retired Air Force officer with assignments as an aircraft commander and instructor pilot, Space Command staff officer and Air Liaison Officer attached to the Army. Has experience in software testing (MASINT applications, analytical workbenches), aircraft flight test (LAIRCM, F-22), simulator testing, as well as systems engineering in support of Global Hawk and the F-15. Also teaches courses at Embry-Riddle Aeronautical University in mathematics, statistics, program management and research and development. Has a degree in Aerospace Engineering, Space Operations as well as an MBA. Mr. James Mallonee is an experienced Russian translator, analyst, and intercept operator with over 30 years’ Air Force and DoD experience world-wide, including serving as the Russian Liaison at Tuzla AEB, Bosnia-Hertzogovina in 1999-2000 and DIA Liaison to RC-East, Bagram AEB, Afghanistan in 2010. He has a BS in History and Russian Area Studies from Excelsior College, and a MS in Profession Education from Capella University. Mr. Joe Sowers is an Army Special Forces Intelligence sergeant veteran with three overseas deployments. He has a BA in intelligence operations from AMU, MA in intelligence analysis from AMU, and is currently a doctoral candidate from Henley-Putnam University. Mr. Richard Hill (R.K.) is the Global Hawk Program Office Block 30 Engineer. He has more than 40 years of experience in Air Operations, Joint Planning, Satellite and airborne sensor analysis, geospatial analysis, and physics with the U.S. Air Force and private industry. He has an MS in Engineering Physics, specializing in Optics and Lasers, from the Air Force Institute of Technology (AFIT). Dr. John Scrivani is the Geospatial Projects Manager at the Virginia Information Technologies Agency. He has over 30 years of experience in geographic information systems (GIS) and has taught at the University of Virginia and Virginia Tech. He has a PhD in Forest Management from Oregon State University. Mr. Mark Vandenabeele is an Account Manager and Instructor for Exelis Visual Information Solutions. He has over 15 years’ experience in the Intelligence Community as an analyst and program manager. He has an MA in Education from Ashford University and is working on the dissertation for his Doctor of Education degree. Dr. Charles Ward managed the National Ground Intelligence Center Measurement and Signatures Division and has over 30 years of experience working in science and technical intelligence. He served in the U.S. Air Force Reserves as a Targeting Officer. Dr. Ward holds PhD in Nuclear Engineering from the University of Virginia. Mr. Greg F. has over ten years' active duty and reserve Naval, contractor, and government civilian experience in all-source general military and counterterrorism intelligence analysis. He received an MS in International Relations (National Security Studies concentration) from Troy University in 2011. 33 Tuition and Fees Analyst Boot Camp (ABC). Tuition for the 10-week Analyst Boot Camp (ABC) includes 400 contact hours of instruction and all course materials. This tuition represents a 50% discount off of our standard daily rates. The tuition does not include room and board. Students are responsible for their room, board and all other living expenses. Students will not be responsible for any increase in fees or tuition after the first day of class. ABC (10 Week) Tuition: $9,995 Breakdown of Payment o Term One (Week 1-5) = $4,997.50 o Term Two (Week 6-10)= $4,997.50 Cyber Analysis Data Security (CADS). Tuition for the 10-week Cyber Analysis Data Security (CADS) includes 400 contact hours of instruction. Course tuition includes all course materials except textbooks. The CADS program also includes a separate required lab fee. CADS (10 Week) Tuition and Fees: $6,500 Breakdown of Payment o Term One (Week 1-5) = $3000 (tuition) + $500 (lab fee) = $3500 o Term Two (Week 6-10)= $3000 Short Courses. Tuition and fees for training short courses vary based on length and topic. Pricing information is available on the ATIC website course announcement. ATIC has a GSA MOBIS Schedule 874 price list applicable to government and military personnel. Grievance Procedure Any student with a grievance against ATIC is encouraged to speak with the Senior Vice President for Operations at any time. He can be reached at the following. Tim Shaw SVP for Operations 937-429-7806 [email protected] If the student’s grievance is not settled to their satisfaction, the student has the right to contact The State of Ohio Board of Career Colleges and Schools. State of Ohio Board of Career Colleges and Schools 30 East Broad Street, Suite 2481 Columbus, Ohio 43215-3414 34 (614) 466-2752 Fax (614) 466-2219 Toll Free (877) 275-4219 E-mail: [email protected] Website: http:// scr.ohio.gov Administrative and Academic Policies for Students Grading Students are assessed on a pass/fail basis. A passing grade is defined as meeting 75% or more of the objectives for any given exercise, assignment, or examination. Students will be provided written and oral feedback on their progress at least every week. If students score less than 75% on a training activity, they may request three days to re-accomplish and submit the training activity. Graduation Requirement Students must successfully complete 90% of the courses and be present for at least 90% of the entire program to receive a program certificate. If a student does not meet the program certificate requirements they will be issued individual certificates for each of the classes they successfully completed. Probation Period Students who fail to reach the 75% threshold at the end of any week will be placed on academic probation for the remainder of the program . Additional tutoring and/or remediation is available for any section of the ABC from both the individual instructor or the ATIC staff. 35 Conditions for Interruption for Unsatisfactory Grades or Progress If a student does not achieve a satisfactory grade of 75% or above during the probation period, ATIC will notify the VA to interrupt the student’s educational benefits and will notify the government to cease processing of the student’s security clearance request. Conditions for Re-Entrance After Unsatisfactory Progress or Conduct if students are removed for unsatisfactory progress or conduct, they must wait one full calendar year before applying for re-admission to an ATIC training program. Students must clearly demonstrate the steps taken to resolve the previous issues causing the unsatisfactory progress or conduct. Re-admission to an ATIC training program is not guaranteed and will be addressed on a case-by-case basis by the Director of Training. Students re-entering the program will be subject to any updated admission procedures, policies, and fees. Attendance/Absence Policies Students are expected to attend all class sessions offered during a training program. If a student must miss any portion of the training for any reason, the student must make every effort with the instructor and the ATIC staff to make up any assignments not completed. Students have the option of making up classes by attending the same or a similar class within six months of the missed class at the discretion of the Director for Education and Training. If a student’s absences exceed 10% of the scheduled hours in the training program, the student will get certificates for the individual courses they completed. Moreover, ATIC will notify the VA to terminate the payment of educational benefits and will notify the government to cease processing of the student’s security clearance request. Enrollment Dates Students may apply for training programs at any time. All application materials are due two weeks prior to the start of any program. Leave Policy ATIC does not allow a leave of absence. Any student missing more than 10% of scheduled classes is required to withdraw from the training program and may re-apply after one full calendar year. Re-admission to the training program is not guaranteed and is addressed on a case-by-case basis. Students re-entering the program will be subject to any updated admission procedures, policies, and fees. Tardiness Policy Any student reporting for a class more than 15 minutes late will be considered tardy. Three tardies will be counted as one unexcused absence. Make-Up Work Policy 36 Students are responsible for attending all class sessions offered during the training program. If a student must miss any section of the training program for any reason, the student must make every effort with the instructor and the ATIC staff to make up any assignments not completed. Students have the option of making up classes by attending the same or a similar class within six months of the missed class at the discretion of the Director for Education and Training. Advanced Technical Intelligence Center for Human Capital Development 2685 Hibiscus Way, Suite 110 Beavercreek, Ohio 45431 (937) 429-7601 [email protected] © ATIC HCD, 2013-2014. All rights reserved. 37
© Copyright 2024