Training Catalog

March 13, 2015
www.atichcd.org
2
0
1
5
Training Catalog
Advanced Technical Intelligence Center for Human Capital Development
2685 Hibiscus Way, Suite 110 Beavercreek, Ohio 45431
(937) 429-7601 [email protected]
OSBCCS Certificate Number: 1978
© ATIC HCD, 2015-2016. All rights reserved.
Welcome to ATIC
In trod uction
Dear Students,
Welcome to the Advanced Technical Intelligence Center for
Human Capital Development. Along with our web site,
this Training Catalog provides information you will need
during your studies here at ATIC. We provide high-quality
and up-to-date training which the Intelligence Community
demands. Our courses are taught by leading scholars and
practitioners in their respective fields, so your work here will
be challenging but rewarding. Most importantly, the
training you receive at ATIC is recognized across the Defense
and Intelligence Communities for its relevance and rigor.
ATIC graduates are performing critical analytic functions
throughout the community, across industry and
government, and we are looking forward to helping you join
their ranks.
Please feel free to contact me at [email protected] if you
have any questions regarding your program. We want your
time at ATIC to go as smoothly as possible, so please do not
hesitate to ask questions. Again, welcome to ATIC and I look
forward to working with you.
Sincerely,
Cassie Barlow, Ph.D.
Executive Director
1
P a r t n e r i n g – C u l t i v at i n g - A n al yzi n g
A n al
Table of Contents
ATIC Overview ........................................................................................................................................ 4
Vision, Mission, Strategy & Values ......................................................................................................... 5
Nondiscrimination Statement ................................................................................................................ 5
License and Recognition ......................................................................................................................... 6
Administration ........................................................................................................................................ 6
Board of Trustees ............................................................................................................................... 6
Officers ............................................................................................................................................... 7
Facilities .................................................................................................................................................. 7
Equipment .............................................................................................................................................. 8
Payment and Refund .............................................................................................................................. 8
Refund Policy ...................................................................................................................................... 7
Security Clearance .............................................................................................................................. 9
Academic Calendar ................................................................................................................................. 9
Class Schedule and Holidays............................................................................................................... 9
Analyst Boot Camp (ABC) 2015 Program Dates ................................................................................. 9
Cyber Analysis Data Security (CADS) 2015 Program Dates .............................................................. 10
Standards of Conduct ........................................................................................................................... 10
Conditions of Dismissal for Unsatisfactory Conduct ........................................................................ 10
Policy for Granting Credit for Previous Education and Training....................................................... 10
Administrative and Academic Policies ................................................................................................. 11
Grading ............................................................................................................................................. 11
Graduation Requirement ................................................................................................................. 11
Analyst Boot Camp Program Overview ................................................................................................ 11
Admission ......................................................................................................................................... 12
Intelligence Community Orientation Course .................................................................................... 12
Cyber Analysis Data Security Program Overview ................................................................................. 12
CADS Admission................................................................................................................................ 12
Intelligence Analysis Course Descriptions ............................................................................................ 13
ABC Core Courses ............................................................................................................................. 13
2
Technical Applications in Intelligence Courses................................................................................. 18
Intelligence and Analysis Software Courses ..................................................................................... 24
Cyber Security and Analysis Courses ................................................................................................ 25
CADS Core Courses ........................................................................................................................... 25
“Short” Courses .................................................................................................................................... 29
Industry Partner Training and Education Courses ............................................................................ 29
ATIC Training Intermediate and Advanced Courses ......................................................................... 29
Professional Development ................................................................................................................... 30
Principal Faculty ................................................................................................................................... 30
Adjunct Faculty ..................................................................................................................................... 31
Tuition and Fees ................................................................................................................................... 34
Grievance Procedure ............................................................................................................................ 34
3
ATIC Overview
Headquartered in Dayton Ohio, the Advanced Technical Intelligence Center for Human
Capital Development (ATIC) is an independent 501(c)(3) not-for-profit organization
established to help address critical human capital and technological development needs
within the US Intelligence Community (IC) and related industries. The primary mission of
ATIC is to educate and train a workforce of appropriately cleared government and
contractor personnel capable of generating actionable information from technical
intelligence systems. ATIC currently supports workforce development in the areas of
technical intelligence analysis, cyber security, and law enforcement analysis. ATIC also
provides a multi-level security environment to support collaborative research,
development, test and evaluation of advanced analytic tools, techniques, and
methodologies particularly in the area of enhancing human performance.
The original vision for ATIC grew out of a need to fill open intelligence analyst positions in
the Dayton Region and throughout the U.S. Intelligence Community. Critical shortfalls in
that area were becoming increasingly evident due to an aging workforce, fewer U.S. citizens
receiving science and technology degrees, and changing threats to our nation.
Today, ATIC is directly associated with Wright State University Research Institute, and
continues to collaborate with government, industry, and academia. In return, ATIC offers
access to a trained, cleared workforce, support for continuing education requirements,
secure facilities for ongoing operations, and managed research and development
programs. Support of ATIC's mission and collaboration with its stakeholders bring value to
the Dayton region and to the intelligence and national security missions of the United
States. These collaborative efforts highlight the capabilities of the Dayton region to a
national audience.
4
Vision, Mission, Strategy & Values
Our VISION To be the recognized national leader in the discipline of Analytic Tradecraft.
We educate and train analysts in the intelligence discipline to better prepare
leaders for any operational environment.
Our MISSION Create value by partnering with government, industry and academia in
cultivating all-source and cyber analysts for the intelligence and law
enforcement communities.
Our STRATEGY –
Leverage synergistic outcomes across three Centers: along with the
Aerospace Professional Development Center, and Regional STEM
Collaborative Center ATIC meets the aerospace and defense industry’s
dynamic workforce needs, through high-quality programs of instruction,
research, studies, and specialized support focused on Intelligence, cyber and
law enforcement.
Our VALUES –
Integrity — Honor in our behavior
Commitment — Honor in our agreements
Cooperation — Honor in our partnerships
Nondiscrimination Statement
ATIC does not discriminate against any student or applicant because of race, color, religion, sex
(including pregnancy and gender identity), national origin, political affiliation, sexual orientation,
marital status, disability, genetic information, age, membership in an employee organization,
retaliation, parental status, military service, or other non-merit factor.. This policy shall include, but
5
not be limited to, the following: admission policies, scholarship and loan programs, or other
ATIC- administered programs.
License and Recognition
The Advanced Technical Intelligence Center for Human Capital Development is licensed by
the Ohio State Board of Career Colleges and Schools (Registration No. 12-01-1978T). ATIC’s
Analyst Boot Camp Certificate Program meets the provisions of Chapter 3332 of the Ohio
Revised Code, meeting the standards, rules and regulations of the Board.
The Analyst Boot Camp in Dayton (Beavercreek), Ohio is approved for Veterans’ Benefits
under the GI Bill. Qualified veterans may be eligible to use GI Bill benefits to offset the cost
of training. VA Benefits may vary. Always consult with your VA counselor. More
information is available at www.gibill.va.gov.
The Advanced Technical Intelligence Center is a member of the Department of Defense
Intelligence Training and Education Board (DITEB), a governmental steering group under the
direction of the Undersecretary of Defense for Intelligence to monitor and enhance
certification and professional development in intelligence training and education activities.
Administration
Board of Trustees
Dr. David Hopkins, Chairman
Wright State University
Mr. Gary O’Connell
USAF Retired, Senior Executive
Mr. Dennis Andersh
CEO, Wright State Research
Institute
Mr. John Landess
Executive Director, The Turner
Foundation
Mr. Hugh K. Bolton
Senior Fellow, Wright State
University
Mr. William Dungey
Capt (Ret) USAF, Air Force Civil Service
Member
Mr. Michael Bridges
Peerless Technologies, Corp.
6
Mr. Mike Gearhardt
Vice President, JBK Manufacturing and
Development, Co.
President & CEO, Dayton Development
Coalition
Dr. S. Narayanan
Wright State University
Mr. Jeffrey Hoagland
Officers
Dr. David Hopkins – Chairman of the board
Dr. Cassie Barlow, Col (Ret), USAF – Executive Director
Dr. Timothy Shaw, Special Agent (Ret), FBI – SVP & Director of Operations
Mr. Mike Gearhardt – Treasurer
Ms. Beverly Shillito – Secretary
Facilities
The ATIC main campus facility is located at 2685 Hibiscus Way in Beavercreek, Ohio and
includes over 38,000 square feet of instructional and administrative space at the
Unclassified, Secret Collateral, and Top Secret/SCI levels. The ATIC facility consists of:








7 dedicated classrooms capable of hosting over 250 students simultaneously; All
classrooms can be easily converted to additional computer lab space using ATIC’s
portable laptop classroom
3 dedicated computer labs capable of hosting 50 students simultaneously and
providing high-speed Internet access along with the latest analytical software
packages
A Center for Law Enforcement Analysis and Training (CLEAT) that enables students
to work on analysis issues affecting law enforcement agencies
A Situational Awareness Lab (SAL) where students can hone their skills on real-world
intelligence data
A Cyber Analysis Research Lab (CARL) where students can apply cyber security skills
A 259-seat secure auditorium for graduations and special events
Student breakout rooms, work areas, library, and lounge area
Administrative and faculty offices
The ATIC Learning Center is located at 4170 Allium Court in Springfield, OH. The Learning
Center houses advanced information technology infrastructure and lab spaces to support
ATIC’s cyber security training activities, as well as commercialization of cyber technology
research and development. This facility is available to rent.
1
Equipment
In our dedicated computer labs ATIC has 38 high capacity HP desktop computers with dual
monitors to maximize data visualization. We also have 47 HP laptop computers that can be
utilized to turn any classroom into a computer lab. All desktop and laptop computers have
Microsoft Office® products and Internet access. Additional software packages available for
student use and instruction include:
ArcGIS®
MATLAB®
AutoCAD®
OPTICKS®
ENVI®
Oracle®
SOCET GXP®
Systems Tool Kit®
Google Earth®
Payment and Refund
Students are encouraged to pay the entire tuition for ATIC training programs by the first day
of term one of the programs. For programs over 300 contact hours, students have the
option to pay 50% of the tuition by the first day of term one. Students making a partial
payment are only permitted to attend through the end of term one (i.e., 50% of the
program). The remaining 50% of the tuition is due by the first day of the second term
to continue in the program.
No student will be able to start the first day of term one of the program without having
paid at least 50% of the tuition.
No student will be able to start the first day of term two of the program without having
paid 100% of the tuition.
Refund Policy
Students who withdraw from the program before the first day of class are eligible for
a refund of 100% of their paid tuition.
7
A student who starts class and withdraws or is dismissed before the academic term is
15% complete will be obligated for 25% of the tuition for the current academic term.
ATIC will provide all deadlines for payment on the first day of class.
A student who starts class and withdraws or is dismissed after the academic term is 15%
complete but before the academic term is 25% complete will be obligated for 50% of
the tuition for the current academic term. ATIC will provide all deadlines for payment
on the first day of class.
A student who starts class and withdraws or is dismissed after the academic term is 25%
complete but before the academic term is 40% complete will be obligated for 75% of
the tuition for the current academic term. ATIC will provide all deadlines for payment on
the first day of class.
A student who starts class and withdraws or is dismissed after the academic term is 40%
complete will not be entitled to a refund of the tuition for the current academic term.
ATIC will provide all deadlines for payment on the first day of class.
Security Clearance
Any student who fails to pay 100% of the tuition by the first day of the second term or
withdraws from the program before the last day of the second term will not be eligible
to continue the security clearance process. ATIC will cancel the sponsorship of the
student's security clearance.
Academic Calendar
Full time ATIC classes meet 8 hours per day, Monday through Friday from 8:30am to
4:30pm, including a one hour lunch break. Part time or evening classes generally meet 4
hours per day, Monday through Friday from 5:30pm to 9:30pm.
Class Schedule and Holidays
The ATIC facility is open Monday through Friday from 7:30am to 10:00pm. Saturday
hours are also available on an as-needed basis. ATIC is closed on Sundays and the
following holidays:
Martin Luther King, Jr. Day (19 Jan)
Memorial Day (25 May)
Independence Day (4 Jul)
Labor Day (7 Sep)
Thanksgiving (25-26 Nov)
Christmas (24-25 Dec)
New Year’s Day (1 Jan 2016)
Analyst Boot Camp (ABC) 2015 Program Dates
8
Dayton, OH (with classes held at ATIC Main Campus in Beavercreek, OH)
Spring:
Summer:
Fall:
12 January to 20 March 2015 (enroll by 29 Dec 14)
18 May to 24 July 2015 (enroll by 4 May 15)
8 September to 13 November 2015 (enroll by 25 Aug 15)
Classes within the boot camp may be taken on an individual basis. Interested students
should refer to the website or contact ATIC for scheduling and tuition information.
Cyber Analysis Data Security (CADS) 2015 Program Dates
Springfield, OH (with classes held at the ATIC Learning Center, Springfield, OH)
Spring:
Summer:
Fall:
12 January to 20 March 2015 (enroll by 29 Dec 14)
18 May to 24 July 2015 (enroll by 4 may 15)
8 September to 13 November 2015 (enroll by 25 Aug 15)
Standards of Conduct
All students at ATIC are expected to conduct themselves with the highest standards of
professional conduct and ethics at all times. Behavior that is disruptive, unethical, illegal,
threatening, or destructive will not be tolerated. Students who fail to follow these Standards of
Conduct will be dismissed from training, and their application for a security clearance will be
withdrawn. All students must understand and abide by the written Standards of Conduct for
Students policy. Students will sign and acknowledge the policy guidance on the first day of
class.
Conditions of Dismissal for Unsatisfactory Conduct
The Executive Director of ATIC has the authority to dismiss any student who violates ATIC’s
published policies. ATIC will maintain a permanent record of the expulsion in the student’s
file.
Policy for Granting Credit for Previous Education and Training
The Director of Training will evaluate official transcripts and documentation of previous
education and training current within the last three years, and determine if any credit will
be given to the student for previous work completed.
10
Administrative and Academic Policies
Grading
Students are assessed using a combination of scores and grades for some activities and on a
Pass/Fail basis for participation in other activities. A passing grade is defined as meeting
75% or more of the objectives for any given exercise, assignment, or examination. Students
will receive weekly written and oral feedback on their progress. If students score less than
75% on a training activity, they may request three days to re-accomplish and submit the
training activity.
Graduation Requirement
Students must successfully complete 90% of the courses and be present for at least 90% of
the entire program to receive a program certificate. If a student does not meet the program
certificate requirements they will be issued individual certificates for each of the classes
they successfully completed.
Transcripts
Students and alumni considered in good standing may request an official ATIC transcript.
Requests must be made in writing via letter and must include the student’s signature. A
transcript request form is available on the ATIC website.
Additional administrative and academic policies are provided during student orientation.
Analyst Boot Camp Program Overview
The Analyst Boot Camp (ABC) is a rigorous 10-week program designed to provide students with
the necessary tools to be successful analysts in the Intelligence Community (IC). Throughout
the program students will be regularly challenged with analytic exercises as well as writing and
briefing assignments on current intelligence issues. The program requires U.S. citizenship and
eligibility for a security clearance. Upon completion of the ABC, students with no previous
intelligence experience may be qualified for entry level-positions in the intelligence workforce
with government organizations, private industry, or academia. Courses begin at the unclassified
level and transition as students gain their security clearances.
The Analyst Boot Camp includes 400 hours of instructional time including 232 hours of Core
Foundation Analytic Skills coursework and 168 hours of Intelligence Discipline/Tradecraft
courses including analytic software tools. Course titles and descriptions are in this catalog.
11
Admission
Minimum requirements for acceptance to the Analyst Boot Camp include all of the following:
 Complete ABC Application
 Submit resume
 Successful admission interview
 At least 20 years of age as of the first day of class (Proof of date of birth includes Driver’s
License, State-Issued ID, Birth Certificate, or Passport)
 U.S. citizenship (Proof of U.S. citizenship includes Passport, Birth Certificate,
Naturalization Certificate, DHS Form I-9, or DD Form 1966)
ATIC reserves the right to request proof of the following documents if applicable:
 Honorable Discharge or General Discharge Under Honorable Conditions (i.e., DD214)
 High School Completion
 Transcripts from any/all education and training
Intelligence Community Orientation Course
Students may elect to take only the first half (five weeks) of the Analyst Boot Camp, to
familiarize them with the fundamental structure and components of the Intelligence
Community. Students who satisfactorily complete the five week course will receive a
Certificate of Training in Intelligence Community Orientation. The cost of this course
is3$4,997.50.
Cyber Analysis Data Security Program Overview
The CADS is an intensive 10-week training program designed to prepare students for careers as
Cyber Security Analysts. The curriculum offers a direct learning experience to the student
through a virtual environment and content. Students will learn by doing, discovering and
exploring cyber security and data analysis in an experiential learning environment. Throughout
the program students will be regularly challenged with hands-on analytic and cyber security
exercises. Upon successful completion of the CADS, students with no prior cyber security
experience may be qualified for entry-level positions in the cyber security workforce with
government organizations, private industry, or academia. Course titles and descriptions are in
this catalog.
CADS Admission
Minimum requirements for acceptance to the CADS include all of the following:



Complete CADS Application
Submit resume
Successful admission interview
12





At least 18 years of age as of the first day of class
Successful completion of criminal background check
Security+ Certification (or equivalent demonstrated ability)
Network+ Certification (or equivalent demonstrated ability)
Bachelor’s degree is preferred, but not required
ATIC reserves the right to request proof of the following documents if applicable:
 Honorable Discharge or General Discharge Under Honorable Conditions (i.e., DD214)
 High School Completion
 Transcripts from any/all education and training
Intelligence Analysis Course Descriptions
Theory
Lab
Total
Hours
Introduction to the Intelligence Community (IC)
24
0
24
Operational Security (OPSEC)
8
0
8
History of the Intelligence Community
8
0
8
Legal and Ethical Issues in Intelligence
8
0
8
Open Source Intelligence (OSINT) Analysis
4
4
8
How to Think Like an Analyst
8
16
24
Counterintelligence
8
0
8
Intro to Intelligence, Surveillance, & Reconnaissance
8
0
8
How to Write Like an Analyst
16
8
24
How to Brief Like an Analyst
8
16
24
Human Intelligence (HUMINT) Analysis
8
0
8
Signals Intelligence (SIGINT) Analysis
8
0
8
Imagery Intelligence (IMINT) Analysis
4
4
8
Geospatial Intelligence (GEOINT) Analysis
Measurement and Signature Intelligence (MASINT)
Analysis
4
4
8
8
0
8
Mid Term Briefing
Capstone Exercises and Final Briefings
0
0
16
40
16
40
Course
13
ABC Core Courses
ICO 1011 Introduction to the Intelligence Community (IC)
Introduction to the Intelligence Community introduces the historical development of the U.S.
Intelligence Community and its current construct. The course reviews the major events that
shaped the IC from the American Revolution to the present day. Discussions include the
effectiveness of the IC in different historical circumstances and evaluation of future reform
efforts.
ICO 1011 History of the Intelligence Community
The History of the Intelligence Community course introduces the historical development of the
U.S. Intelligence Community. The course reviews the major events that shaped the IC from the
American Revolution to the present day. Discussions include the effectiveness of the IC in
different historical circumstances and evaluation of future reform efforts. This course covers
the major forces that continue to influence U.S. intelligence policy.
ICO 1091Law and Ethics in Intelligence
Legal and Ethical Issues in Intelligence introduces the key elements of the legal framework
underlying the activities of the Intelligence Community. This course provides an understanding
of the abuses within the IC and the resultant reforms. Ethical concerns surrounding intelligence
activities are discussed and analyzed.
ICO 1023 Open Source Intelligence (OSINT) Analysis
Open Source Intelligence (OSINT) Analysis is an exploration of the vast array of publicly
available source material available to analysts in newspapers, videos, and journals, primarily via
the Internet. This course provides an overview of the necessary tools to effectively search,
acquire, and analyze data to meet an intelligence need.
ICO 1043 How to Think Like an Analyst
How to Think Like an Analyst is an introduction to critical thinking. Students will learn why
critical and creative thinking are important to intelligence analysis and the problem solving
process. Students will learn to apply eight elements of thought to critically evaluate a written
14
product. Students will be able to describe intellectual standards and how they apply to
intelligence analysis. This course introduces structured analytic techniques - some widely used
in the private sector and academia, some unique to the intelligence profession.
ICO 2011 Counterintelligence
The Counterintelligence (CI) course introduces the role of counterintelligence as an essential
element of U.S. National Security Strategy and explains the fundamental elements of CI. This
course covers the National Counterintelligence Strategy of the U.S., the fundamental elements
of the Counterintelligence discipline, and the Foreign Threat Overview. The threat overview
includes industrial, economic, and traditional espionage threats with a particular focus on the
Chinese CI threat to U.S. interests.
ICO 1001 Operational Security (OPSEC)
Introduction to Operational Security will introduce the student to the threat to the analytical
world by a number of adversaries. This course will teach the student the simple and effective
methods to protect information and secrets. The number of ways to collect information from
an individual, company or nation has grown and the level of exposure has grown as well. This
course will touch on how the adversary will try and collect the “pieces of the puzzle” for
exploitation.
ICO 1023 How to Write Like an Analyst
How to Write Like an Analyst provides an understanding of analytical writing including its
various concepts and tools. This course is designed to be relevant to the broad spectrum of
intelligence problems that a professional analytical writer will face. Students gain a
fundamental knowledge of technical writing, research methodology, and commonly used
search tools to develop the core of a Body of Knowledge (BOK) for intelligence production.
Students learn the differences between academic and technical writing. Students will practice
writing using the “industry” standards called Intelligence Community Directives set forth by the
Office of the Director of National Intelligence (ODNI).
15
ICO 1033 How to Brief Like an Analyst
How to Brief Like an Analyst provides an introduction to the presentation skills and research
methods commonly used to develop intelligence products. This course covers basic concepts,
including a background survey on the processes used for briefing intelligence topics, as well as
adherence to community of practice standards required by the Office of the Director of
National Intelligence (ODNI). Students learn how to construct and execute a presentation
(briefing) composed of sourced technical intelligence. How to Brief Like an Analyst presents a
broad spectrum of briefing topics and situations that analyst may face as an intelligence
professional. This course provides an exploration of how specific techniques and decision rules
can be used to help maximize reliability of finished intelligence products.
ICO 3021 Human Intelligence (HUMINT) Analysis
Human Intelligence (HUMINT) Analysis provides an understanding of the specialized
intelligence discipline that relies on human assets to provide information to our national and
military decision-makers. This course comprehensively examines the HUMINT discipline from
its collection methods, types, legalities, techniques, and especially analytical considerations,
while emphasizing the importance of HUMINT.
ICO 3061 Signals Intelligence (SIGINT) Analysis
The Signals Intelligence (SIGINT) Analysis course is an introduction to the technical intelligence
collection discipline that involves intercepting signals emitted from a variety of sources,
including communications intelligence (COMINT), electronic intelligence (ELINT) and foreign
instrumentation signals intelligence (FISINT). This course includes an overview of other
disciplines such as cryptography and traffic analysis as they relate to SIGINT.
ICO 3041 Imagery Intelligence (IMINT) Analysis
Imagery Intelligence (IMINT) Analysis provides an introduction to the basics of imagery
intelligence analysis and its many uses throughout the Intelligence Community. This course
provides an understanding of airborne tactical collection platforms such as Global Hawk,
Predator, and the U-2 (which utilize Synthetic Aperture Radar/SAR, Infrared Imagery/IR, and
Electro-Optical/EO sensors to collect imagery). Imagery Intelligence Analysis explains the
relationship between IMINT and other technical data collection sources including SAR MASINT
(Measurement and Signatures Intelligence) and LADAR (laser detection and ranging).
ICO 3051 Geospatial Intelligence (GEOINT) Analysis
16
Geospatial Intelligence (GEOINT) Analysis traces the history of GEOINT from its earliest
incarnations using scouts and maps in the American Civil War to the current state-of-the-art
satellites and sophisticated overhead surveillance platforms that capture imagery and video in
real-time. This course is a broad look at GEOINT. Geospatial Intelligence (GEOINT) Analysis
demonstrates how GEOINT adds value to intelligence products. This course delves deeper into
the way GEOINT is specifically used at NASIC to enhance products sent to current warfighters.
ICO 3031 Measurement and Signature Intelligence (MASINT) Analysis
The Measurement and Signature Intelligence (MASINT) Analysis course includes introduction to
the six sub-disciplines covered under Measurement and Signature Intelligence (MASINT), which
are Electro-Optical (e.g. Light Detection and Ranging – LIDAR), Radio Frequency (e.g.
Unintentional Radiated Emissions, Directed Energy Weapons), Materials (Chemical, Biological,
Radiological, Nuclear and Explosives – CBRNE); Radar (Bistatic, over-the-horizon, and line-ofsight – description only) Geophysical (magnetic, acoustic, gravimetric); and Nuclear Radiation.
ICO 5012 Mid Term Briefing
The Mid-Term Briefing is a practicum course for the first half of the Analyst Boot Camp. This
experience enables the students to utilize skills learned during the first five weeks to compile
and produce a comprehensive current intelligence product. Students present the product to a
panel of intelligence experts.
ICO 5015 Applied Analytic Skills
Applied Analytic Skills is the capstone course for the Analyst Boot Camp. This experience
focuses on the utilization of previous coursework to compile and produce a comprehensive
intelligence product. Students present the product to a panel of intelligence experts.
17
Technical Applications in Intelligence Courses
Theory
Lab
Total
Hours
Introduction to Terrorism
8
0
8
Introduction to Cyber Threat
8
0
8
Order of Battle Analysis
8
0
8
Order of Battle Analysis Lab
Introduction to Intelligence, Surveillance, and
Reconnaissance (ISR)
0
8
8
8
0
8
Introduction to Radar
8
0
8
Overhead Persistent Infrared (OPIR)
8
0
8
Synthetic Aperture Radar (SAR)
8
0
8
Thermal IR Analysis
8
0
8
Spectral Analysis
8
0
8
Multi- and Hyper-spectral Imaging Analysis
8
0
8
Introduction to Systems Tool Kit
8
0
8
Course
18
Chemical and Biological Weapons
8
0
8
Radiological and Nuclear Weapons
8
0
8
Introduction to Space Analysis
8
0
8
Integrated Air Defense Systems (IADS)
8
0
8
Electronic Warfare
8
0
8
Introduction to GIS Analysis-ArcGIC
16
0
16
Introduction to Network Analysis with Lumify
16
0
16
HLS 1011 Introduction to Terrorism
The Introduction to Terrorism course provides students with the foundational knowledge for
further terrorism studies. The course explains the definitions of terrorism and differentiates
between terrorism and other forms of violence. A brief history of terrorism is provided along
with an explanation of the different motivations for terrorist violence. This course surveys a
wide range of existing terrorist groups, examines certain high-profile themes (e.g., statesponsored terrorism, suicide terrorism, and CBRN terrorism), and assesses the nature of the
threat terrorists pose to U.S. national security as well as the current status of the Global War on
Terrorism (GWOT).
CYB 1051 Introduction to the Cyber Threat
Introduction to the Cyber Threat presents an overview of the basics of cyber security and threat
awareness pertaining to networks, companies, and government organizations. Perpetrators
include: organized crime, individuals, and both state and non-state actors seeking to disrupt
systems and profit financially.
19
OOB 1012 Order of Battle Analysis
Order of Battle Analysis introduces the term Order of Battle (OoB) and explains what it means,
the elements that constitute an OoB, and the origins of the OoB concept. This course provides a
fundamental understanding of the utility of analyzing an adversary from an OoB perspective
and how this approach differs from a simple disposition of forces approach. The U.S. OoB will
be used to highlight various OoB components and as an example to demonstrate the entire
OoB concept. Top level treatment of Foreign OoB will be presented to show the similarities and
differences between the types and complexities of countries OoB.
OOB 1012 Order of Battle Analysis Lab
The Order of Battle Analysis Lab applies the lessons learned in the prerequisite Order of Battle
courses. Students present the capabilities of assigned countries in hypothetical match-ups
between potential adversaries, analyze their Order of Battle, and assess likely outcomes.
ICO 1103 Introduction to Intelligence, Surveillance, and Reconnaissance (ISR)
Introduction to ISR surveys the electromagnetic spectrum, platforms, applications, visible and
infrared sensor data collection techniques, radar collection techniques, and other technical
issues. Various sensor types are explored in terms of current sensors grouped by altitude,
regime, capabilities and applications, TCPED (Tasking, Collection, Processing, Exploitation, and
Distribution) agencies, sensor trends, and planned future systems.
GEO 1012 Introduction to Radar
The Introduction to Radar course presents the practical application of radar phenomenology
and technology needed to achieve the performance seen in modern radar. This course
familiarizes students with the capabilities and limitations of radar, and the performance and
implementation of its critical sub-systems.
GEO 1031 Overhead Persistent Infrared (OPIR)
20
The Overhead Persistent Infrared (OPIR) course presents an introduction to OPIR with the AllSource Analyst in mind. This course provides a basic understanding of the capabilities of the
systems and how they relate in the production of an intelligence product.
GEO 1012 Synthetic Aperture Radar (SAR)
Synthetic Aperture Radar (SAR) introduces the fundamental principles of SAR and its use in
Advanced Geospatial Intelligence (AGI). Topics include: basic radar operation, SAR data
collection, SAR scene generation, SAR AGI products (Coherent Change Detection, Digital
Elevation Models, Dynamic Imaging), creation of SAR AGI products, and the limitations of SAR.
This course provides an overview of the identification of the intelligence products which could
be requested from a SAR system and under what conditions they would be appropriate.
GEO 1041 Thermal IR Analysis
The Thermal Infrared Analysis course provides an overview of the development of IR analysis as
well as the uses and implementation of IR analysis today. This course covers the capabilities and
limitations of remote sensing, radiation theory, satellite-based sensors, airborne-based sensors,
and associated terminology.
STW 1021 Introduction to Systems Tool Kit
Introduction to Systems Tool Kit familiarizes first-time users with the STK workflow. Topics
include: modeling objects and a basic understanding of STK software suite capabilities.
GEO 1051 Spectral Analysis
The Spectral Analysis course delves into the core of Advanced Geospatial Intelligence: advanced
sensors and analysis techniques applied to detection and discrimination. This course provides
an understanding of how spectral data is used in today's intelligence world.
HLS 2021 Chemical and Biological Weapons
The Chemical and Biological Weapons course provides an overview of the historical use of
CWAs by both state and non-state actors, the different types of chemical warfare agents
21
(CWAs), their effects, the equipment, infrastructure, procedures, and resources required to
produce and effectively dissemination CW agents.
HLS 3011 Radiological and Nuclear Weapons
The Radiological and Nuclear Weapons course will provide students a basic understanding on a
variety of topics ranging from basic physics of nuclear radiation, uses of nuclear materials,
nuclear power plants, the nuclear fuel cycle for power plants, organizations regulating nuclear
energy, basic descriptions of radiological and nuclear weapons, various delivery systems, and
the effects of radiological and nuclear weapons.
SPM 1011 Introduction to Space Analysis
The Introduction to Space course provides the fundamentals of astro-dynamics and concepts of
space system employment and operation through discussions of orbital mechanics, space
environment, space vehicles, launch vehicles, space data transmission, satellite TPED
(Transmission, Processing, Exploitation, Dissemination), command and control of space assets,
and space policy. This course provides a short history of space developments, what physics
concepts apply, an overview of how U.S. space operations work, and what policies,
international treaties, and other rules apply to space.
SPM 1081 Integrated Air Defense Systems (IADS)
This course of instruction will provide the students with an understanding of the origins of
Integrated Air Defense Systems (IADS) and how these systems work to defend critical air space.
Students will understand the components of an IADS and how they work relating to the aspects
of air defense systems integration.
ICO 2071 Electronic Warfare
This course covers Electronic Warfare (EW) at an introductory level. The student will
understand the objectives of EW, how it is divided into various sub-disciplines, and US tenants
for the employment of EW in military operations. Students will learn the history of EW from
World War One through the current day. The student will understand how an EW system is
designed with specific attention to antennas and receiver. The course then covers modern
means of electronic attack such as jamming, decoys, and antiradiation weapons.
STW 1032 Introduction to GIS Analysis
Introduction to GIS Analysis teaches the range of functionality available in the ArcGIS Desktop
software and the essential tools for visualizing, creating, managing, and analyzing geographic
data. The hands-on course exercises emphasize practice with ArcMap and ArcCatalog (the
22
primary applications included with ArcGIS Desktop software) to perform common GIS tasks and
workflows.
STW 1013Introduction to Network Analysis with LUMIFY
Introduction to LUMIFY presents an overview of LUMIFY, which is an information analysis
platform used to integrate, visualize and analyze data of all kinds for the intelligence, defense
and law enforcement communities. This course provides an opportunity for hands on exercises
to import and model data, perform search and discovery exercises against this data and employ
techniques to define and test hypotheses within a multi-dimensional environment. Additional
topics include: exploring hidden patterns/connections, testing hypotheses, and fundamental
knowledge of ontologies.
23
Intelligence and Analysis Software Courses
Course
Full Motion Video (FMV) Analysis
Theory
16
Lab
24
Total Hours
40
Introduction to GIS Analysis
4
12
16
Advanced GIS Analysis
4
20
24
Introduction to Systems Tool Kit
0
8
8
Full Motion Video (FMV) Analysis
The Full Motion Video (FMV) Analysis Certificate course introduces the FMV analysis process
and explores how FMV fits into the larger intelligence cycle. This course offers significant
hands-on experience analyzing FMV data, working with relevant software tools, and creating
intelligence products. This course presents the unique challenges faced by FMV analyst and
discusses the future of FMV analysis.
Introduction to GIS Analysis
Introduction to GIS Analysis teaches the range of functionality available in the ArcGIS Desktop
software and the essential tools for visualizing, creating, managing, and analyzing geographic
data. The hands-on course exercises emphasize practice with ArcMap and ArcCatalog (the
primary applications included with ArcGIS Desktop software) to perform common GIS tasks and
workflows.
Advanced GIS Analysis
The Advanced GIS Analysis course provides a detailed understanding of intelligence processes
using the Military Analyst and Spatial Analyst extensions for ArcGIS. This course covers the skills
required to create, manage, organize, and edit geo-processing applications, utilize geoprocessing tools to analyze data, and create final products ready for dissemination applied to
real world situations.
Introduction to Systems Tool Kit (STK)
Introduction to Systems Tool Kit familiarizes first-time users with the STK workflow. Topics
include: modeling objects and a basic understanding of STK software suite capabilities.
24
Cyber Security and Analysis Courses
Course
Theory
Lab
Total Hours
CYB 1001 Review of Networking Concepts
6
6
12
CYB 1002 Intro to Network Security Monitoring
8
20
28
CYB 1003a Intro to Theory of an Attack
12
12
24
CYB 1003b Intro to Hacking Tools
12
12
24
CYB 1004 Intro to Packet Analysis
12
28
40
CYB 1005 Intermediate Network Security Monitoring
12
28
40
CYB 1006 Intro to Sandboxing and Malware Analysis
12
28
40
CYB 1007 How to Think Like a Cyber Analyst
24
0
24
12
0
12
0
120
120
0
36
36
CYB 1008 Intro to Legal and Ethical Aspects of Cyber
Security
CYB 1009 Network Security Monitoring - Lab in
Practice
CYB 1010 Capstone Project
25
CADS Core Courses
CYB 1001 Review of Networking Concepts
This course will provide a comprehensive review of basic networking, relating to Security+ and
Network+ concepts. This course will strengthen the student proficiency in functionality and
traffic flow of data across networks as it pertains to LAN and WAN communication. Students
will construct a classroom network that will be used through the rest of the course.
Lab Students will construct a virtual computer and install operating systems using different
types of media, to include ISO’s, bootable USB and CD/DVD.
CYB 1002 Introduction to Network Security Monitoring
This course will provide students with an overview of network security monitoring. Students
will discuss and recognize several tool sets utilized to determine intrusions across
communication networks. Student s will be introduced to the concept of sensors and their role
within the network security monitoring framework.
Lab Applying the skills learned in Network Security Monitoring students will construct initial
NSM sensors to be used throughout the rest of the course. Students will develop knowledge
and training about placement of sensors and taps within a virtual network.
CYB 1003a Introduction to Theory of an Attack
It is important to know your enemy. This course will provide students with general attack
theory and insight into the mind of an attacker. Students will recognize the different types of
attackers, their motivations and some of the tools they use including the Backtrack Suite and
Scripting languages.
Lab: Building on the skills learned in CYB103a and b, students will begin to use and demonstrate
about the Operating Systems created in the CYB101 Lab, their environments and perform
navigation and system management through basic operating systems commands. Students will
then apply Backtrack suite and practice some initial attacks on operating systems. Students will
use the knowledge learned about the Python scripting language in CYB103b and begin to write
their own offensive and defensive tools.
26
CYB 1003b Introduction to Hacking tools
This course takes the student through the systems and operating systems that are being
attacked. Students will gain knowledge about vulnerabilities for specific operating systems and
features built into operating systems in order to protect them. Students will also learn basic
commands used in Linux and Windows allowing them to become comfortable navigating in
these environments. Students will also be introduced to the Python Scripting language, its uses
in both offensive and defensive postures.
Lab: Students will demonstrate the use of those tools on the operating systems and VM
environment. Students will be separated into teams and presented with an attack scenario of
which one team will be required to determine how they would attack that system while the
other team will be required to determine how they would protect the same system.
CYB 1004 Introduction to Packet Analysis
Students will be introduced to the idea of the network data packet, how packets are
constructed, the different types of packets and different ways that packets can be manipulated.
Students will gain insight into the tools that are used to capture and view packets and how
those tools can be used for packet analysis. Students will be introduced to the TCP/IP stack and
packet flow as it relates to specific operating systems.
Lab: Students demonstrate with the packet capture tools learned about in “Walking the
packet” and begin capturing packets on their VM Hosts. Students will also begin to analyze
packet data flows, identify information held within and rebuild the packet flows into visual
readable data. The intent of this lab is to begin to allow the students to feel comfortable with
the construction of data and how it is read.
CYB 1005 Intermediate Network Security Monitoring
Students will be taken through the different facets of the Security Onion Framework, the tools
available in the framework and how to use them together in order to monitor traffic on a
network. Students will be introduced to the Bro Scripting Language, how it can be used to
detect anomalies on the wire.
Lab: Students will demonstrate an understanding of the Bro Language and write their first
scripts. They will operate the Security Onion framework to analyze network traffic and
determine attack vectors.
27
CYB 1006 Introduction to Sandboxing and Malware Analysis
Students will be introduced to the concept of sandboxing and how it allows for analysis of
malware in a safe, controlled environment. Students will discover how malware works,
performs and be introduced into how to determine what malware is doing from sandbox
reporting.
Lab: Students will spend time sandboxing specific malware, analyzing data gained in the
sandboxing process and then use that data to write scripts which are designed to detect the
malware involved as it passes through a network. Students will test their scripts using their
NSM Sensors on live network traffic.
CYB 1007 How to Think Like a Cyber Analyst
This course will be a series of lectures covering specific skill sets an Analyst must possess to be a
successful analyst. Students will learn how their role as an analyst fits into the overall
Defensive strategy. They will learn how to react to incidents, how to report on incidents, who
to inform of an attack or an impending attack and how to interact with law enforcement.
Students will hear from a guest speaker in the law enforcement community as one of the
segments in this course.
CYB 1008 Introduction to Legal and Ethical aspects of Cyber Security
Students will be introduced to the different aspects of how legal issues fall into their day to day
roles. Students will identify what they can and can’t do as it relates to tracking an attacker.
Students will also distinguish how the nature of NSM has a fine line in the debate of individual
privacy.
CYB 1009 Network Security Monitoring - LAB in Practice
This course will be a three week intensive lab use of the tools and skills learned throughout the
CADS curriculum. Students will have a significant amount of time to move their knowledge of
NSM from the beginner analyst to a more substantial intermediate foundation. Students will
heavily demonstrate the use of Python and Bro Scripting language, the NSM sensors and the
NSM toolkit introduced to the students throughout the course.
28
CYB 1010 Capstone
Students will be given real world network designs and scenarios in which fictitious companies
need to design, build, and implement NSM security architecture. Students will demonstrate the
deployment of sensors, what tools were used and why; students will also present network
topologies and sample execute scenarios against targeted training data. Students present the
results of their findings in the scenario to a panel of cyber and intelligence experts.
“Short” Courses
Industry Partner Training and Education Courses
ATIC partners with defense intelligence, industry, and academia to host programs of interest to
the Professional Intelligence Workforce throughout the year. Topics, content, and offerings
vary, and are available on the ATIC website.
ATIC Training Intermediate and Advanced Courses
In addition to the formal ABC and CADS, ATIC presents intermediate and advanced-level
courses on topics of interest to the Professional Intelligence Workforce. Short courses range
from a day to several weeks, and are added throughout the year with up-to-date offerings,
information, and registration available on the ATIC website. Currently scheduled courses
include:
Introduction to Imagery Intelligence
The introduction to Imagery Analysis course is a three week overview of Imagery Intelligence
(IMINT) analysis tools and techniques. Students are introduced to information and skills
necessary to perform basic level IMINT analysis and production tasks. Throughout the course,
students will be regularly challenged with application exercises to evaluate and reinforce their
comprehension of the material and their understanding of the role of an Imagery Analyst (IA)
on the integrated IMINT operations team, and in enterprise operations.
29
Intermediate Imagery Intelligence Analysis Course
The Intermediate Imagery Analysis Course is a three week course designed to build on the
fundamentals of Imagery Intelligence (IMINT) taught in the Introduction to Imagery Analysis
Course. The intermediate class expands upon the role of IMINT analysis in intelligence support
to military, civilian, and humanitarian for planners and decision makers. The course focuses on
collection and exploitation planning, remote sensing systems and enhancements, IMINT
reporting, organization and equipment categorization concepts, multi-intelligence fusion, and
the development of product libraries and databases.
Professional Development
ATIC hosts Professional Development events for working Intelligence Professionals. Events
include noted speakers, brown-bag lunches with panels of industry leaders presenting on timely
intelligence, and professional networking social events.
Each autumn, ATIC hosts its Cleared Career Fair, where qualified job seekers holding a verified
government security clearance can meet directly with industry and government organization
representatives. Mixing dozens of employers and hundreds of job seekers, this event
continues to grow in popularity each year and is open to any cleared professional.
More information is available on these classes and all professional development activities on
the ATIC website.
Principal Faculty
Mr. John Hermes is the Cyber Systems Security Administrator. He is a multi-platform
technologist, educator and systems designer experienced in software development,
information security and enterprise IT. Mr. Hermes holds h a B.S. in Computer Science from
Wright State University. He teaches the ATIC Cyber Analysis Data Security (CADS) courses.
Dr. James Mainord is the Assistant Vice President for Strategic Development for ATIC. He has
extensive experience in corporate leadership and business development, and holds a BA in
Political Science from Brigham Young University and Juris Doctor from the University Of Dayton
School Of Law.
Dr. John O'Hair is ATIC’s Chief Scientist. He has more than 28 years of experience in
engineering and intelligence analysis with the U.S. Air Force and private industry. Dr. O'Hair
holds a PhD in Electrical Engineering from the Air Force Institute of Technology (AFIT).
30
Dr. Timothy Shaw is the Vice President for Strategic Development and Director of University
Relations at ATIC. He is the former Dean of the School of Criminal Justice and Social Sciences at
Tiffin University and is a retired Special Agent with the Federal Bureau of Investigation. He
holds a Juris Doctor from Ohio Northern University.
Adjunct Faculty
ATIC utilizes adjunct faculty drawn from government, military, academic, and industry organizations with
extensive operational experience. These practitioners bring valuable insights to the classroom and
provide students with real-world practical knowledge. Full biographies of adjunct instructors are
available on the ATIC website.
Mr. Scott Bethel (Brig Gen, USAF, ret.) retired in 2013 as Vice Commander of the Air Force
Intelligence, Surveillance and Reconnaissance Agency. He previously commanded intelligence
units at the squadron, group, and wing levels, and was Director of Strategy, Integration and
Doctrine and Deputy Chief of Staff for ISR at Headquarters U.S. Air Force. Mr. Bethel is currently
a senior executive in industry. He holds an MS in Strategic Intelligence from the National
Intelligence University, and was a National Defense Fellow at Boston University.
Dr. Robert Clark is professor of intelligence studies at the University of Maryland University
College. He served in the USAF as an electronic warfare officer and intelligence officer; in CIA as
an analyst and group chief; and was president and CEO of the Scientific and Technical Analysis
Corporation (STAC) from 1984 to 1999. Dr. Clark’s books include Intelligence Analysis: A Targetcentric Approach and The Technical Collection of Intelligence. He holds a Ph.D. in Electrical
Engineering from the University of Illinois and a J.D. from George Washington University.
Mr. Chris Earnhardt has over 15 years’ experience in program management and intelligence
analysis, including over six years as a technical intelligence analyst in private industry. He holds
a BS from Clemson University and an MS in Information Resource Management from the Air
Force Institute of Technology, and is a certified Project Management Professional.
Mr. Brian Gold is an acquisition intelligence analyst with the US Air Force, and political-military
intelligence analyst with the US Navy Reserve. He holds a BA from Cleveland State University, a
Master of Military Operational Art and Science from the Air Command and Staff College, and a
JD from the University of Akron School Of Law.
Mr. Gordon Issler has over 27 years’ experience in intelligence with the US Air Force and
industry. He is currently an executive managing intelligence programs in private industry. He
holds Master’s Degree in National Security Strategy, Military Operational Art and Science, and
Management.
31
Dr. James Jacobs teaches at the Keck School of Medicine at the University of Southern
California. He was a Visiting Scholar in the Office of the Chief Medical Officer at the US
Department of Homeland Security. Dr. Jacobs received the Ph.D. in biomedical engineering
from the University of Alabama at Birmingham and the M.D. from Duke University. He is Board
certified in emergency medicine and is a Fellow of the American College of Emergency
Physicians.
Mr. Dan Lewandowski has 30 years’ experience in intelligence, management and space
operations. He holds four Master’s Degrees in Organizational Management, Space Systems,
Military Operational Art and Science, and Strategic Studies.
Mr. Michael Martini is an Intelligence Analyst with over 23 years of engineering and
intelligence analysis experience supporting the U.S. Air Force and private industry. He holds an
MS in Systems Engineering from the Naval Post Graduate School.
Ms. Nicole Parrish has 10 years’ experience in geospatial technologies and analysis with private
industry. She holds a BS in Geographic Information Systems from Ohio University, and an MS in
Criminal Justice from Tiffin University. She is also a graduate of the joint ATIC/Clark State
Community College certificate program in Wide Area Airborne Surveillance and Analysis.
Mr. Kerry Taylor is the Director of the Aerospace Hub at the University of Dayton Research
Institute and a retired U.S. Air Force intelligence officer. He holds an MS in Strategic Studies
from the Air War College.
Mr. Tom Coyle has spent ten years as a National Security consultant, supporting the Office of
the Secretary of Defense (OSD) and later the Office of the Director of National Intelligence
(ODNI)… For several years Mr. Coyle served as a senior Instructor at the Dept. of Defense’s Joint
Counterintelligence Training Academy (JCITA), where he trained military and civilian agents in
two flagship courses. In 2012, Mr. Coyle supported the US Army's Provost Marshal General as
his National Security advisor at the Pentagon.
Dr. Kent Schlussel has over 35 years of experience in engineering development and intelligence
analysis with the U.S. Air Force, Defense Intelligence Agency, and the U.S. Army. Dr. Schlussel
holds a PhD in Applied Mathematics from the University of Virginia.
Mr. Tom Brannon, US Marine Corps Retired, is a 24-year Marine Corps veteran. He taught
International Politics and National Security Policy at the University of West Florida He flew the
F-4 Phantom as a Radar Intercept Officer and is a graduate of US Navy Fighter Weapons School
(Topgun) and the US Marine Corps Weapons and Tactics Instructor Course. Tom served for four
years on the Defense Intelligence Agency staff where he wrote special intelligence analysis for
two Presidents, three Secretaries of Defense and gave classified intelligence presentations to
committees of Congress and the White House Situation Room.
32
Mr. James Miklasevich Retired Air Force officer with assignments as an aircraft commander
and instructor pilot, Space Command staff officer and Air Liaison Officer attached to the
Army. Has experience in software testing (MASINT applications, analytical workbenches),
aircraft flight test (LAIRCM, F-22), simulator testing, as well as systems engineering in support of
Global Hawk and the F-15. Also teaches courses at Embry-Riddle Aeronautical University in
mathematics, statistics, program management and research and development. Has a degree in
Aerospace Engineering, Space Operations as well as an MBA.
Mr. James Mallonee is an experienced Russian translator, analyst, and intercept operator with
over 30 years’ Air Force and DoD experience world-wide, including serving as the Russian
Liaison at Tuzla AEB, Bosnia-Hertzogovina in 1999-2000 and DIA Liaison to RC-East, Bagram
AEB, Afghanistan in 2010. He has a BS in History and Russian Area Studies from Excelsior
College, and a MS in Profession Education from Capella University.
Mr. Joe Sowers is an Army Special Forces Intelligence sergeant veteran with three overseas
deployments. He has a BA in intelligence operations from AMU, MA in intelligence analysis
from AMU, and is currently a doctoral candidate from Henley-Putnam University.
Mr. Richard Hill (R.K.) is the Global Hawk Program Office Block 30 Engineer. He has more than
40 years of experience in Air Operations, Joint Planning, Satellite and airborne sensor analysis,
geospatial analysis, and physics with the U.S. Air Force and private industry. He has an MS in
Engineering Physics, specializing in Optics and Lasers, from the Air Force Institute of Technology
(AFIT).
Dr. John Scrivani is the Geospatial Projects Manager at the Virginia Information Technologies
Agency. He has over 30 years of experience in geographic information systems (GIS) and has
taught at the University of Virginia and Virginia Tech. He has a PhD in Forest Management from
Oregon State University.
Mr. Mark Vandenabeele is an Account Manager and Instructor for Exelis Visual Information
Solutions. He has over 15 years’ experience in the Intelligence Community as an analyst and
program manager. He has an MA in Education from Ashford University and is working on the
dissertation for his Doctor of Education degree.
Dr. Charles Ward managed the National Ground Intelligence Center Measurement and
Signatures Division and has over 30 years of experience working in science and technical
intelligence. He served in the U.S. Air Force Reserves as a Targeting Officer. Dr. Ward holds
PhD in Nuclear Engineering from the University of Virginia.
Mr. Greg F. has over ten years' active duty and reserve Naval, contractor, and government
civilian experience in all-source general military and counterterrorism intelligence analysis. He
received an MS in International Relations (National Security Studies concentration) from Troy
University in 2011.
33
Tuition and Fees
Analyst Boot Camp (ABC). Tuition for the 10-week Analyst Boot Camp (ABC) includes 400
contact hours of instruction and all course materials. This tuition represents a 50% discount off
of our standard daily rates. The tuition does not include room and board. Students are
responsible for their room, board and all other living expenses. Students will not be responsible
for any increase in fees or tuition after the first day of class.

ABC (10 Week) Tuition: $9,995
Breakdown of Payment
o Term One (Week 1-5) = $4,997.50
o Term Two (Week 6-10)= $4,997.50
Cyber Analysis Data Security (CADS). Tuition for the 10-week Cyber Analysis Data Security
(CADS) includes 400 contact hours of instruction. Course tuition includes all course materials
except textbooks. The CADS program also includes a separate required lab fee.

CADS (10 Week) Tuition and Fees: $6,500
Breakdown of Payment
o Term One (Week 1-5) = $3000 (tuition) + $500 (lab fee) = $3500
o Term Two (Week 6-10)= $3000
Short Courses. Tuition and fees for training short courses vary based on length and topic.
Pricing information is available on the ATIC website course announcement. ATIC has a GSA
MOBIS Schedule 874 price list applicable to government and military personnel.
Grievance Procedure
Any student with a grievance against ATIC is encouraged to speak with the Senior Vice
President for Operations at any time. He can be reached at the following.
Tim Shaw
SVP for Operations
937-429-7806
[email protected]
If the student’s grievance is not settled to their satisfaction, the student has the right to contact
The State of Ohio Board of Career Colleges and Schools.
State of Ohio Board of Career Colleges and Schools
30 East Broad Street, Suite 2481 Columbus, Ohio 43215-3414
34
(614) 466-2752 Fax (614) 466-2219 Toll Free (877) 275-4219
E-mail: [email protected] Website: http:// scr.ohio.gov
Administrative and Academic Policies for Students
Grading
Students are assessed on a pass/fail basis. A passing grade is defined as meeting 75% or
more of the objectives for any given exercise, assignment, or examination. Students will be
provided written and oral feedback on their progress at least every week. If students score
less than 75% on a training activity, they may request three days to re-accomplish and
submit the training activity.
Graduation Requirement
Students must successfully complete 90% of the courses and be present for at least 90% of
the entire program to receive a program certificate. If a student does not meet the program
certificate requirements they will be issued individual certificates for each of the classes
they successfully completed.
Probation Period
Students who fail to reach the 75% threshold at the end of any week will be placed on
academic probation for the remainder of the program . Additional tutoring and/or
remediation is available for any section of the ABC from both the individual instructor or the
ATIC staff.
35
Conditions for Interruption for Unsatisfactory Grades or Progress
If a student does not achieve a satisfactory grade of 75% or above during the probation
period, ATIC will notify the VA to interrupt the student’s educational benefits and will notify
the government to cease processing of the student’s security clearance request.
Conditions for Re-Entrance After Unsatisfactory Progress or Conduct
if students are removed for unsatisfactory progress or conduct, they must wait one full
calendar year before applying for re-admission to an ATIC training program. Students must
clearly demonstrate the steps taken to resolve the previous issues causing the
unsatisfactory progress or conduct. Re-admission to an ATIC training program is not
guaranteed and will be addressed on a case-by-case basis by the Director of Training.
Students re-entering the program will be subject to any updated admission procedures,
policies, and fees.
Attendance/Absence Policies
Students are expected to attend all class sessions offered during a training program. If a
student must miss any portion of the training for any reason, the student must make every
effort with the instructor and the ATIC staff to make up any assignments not completed.
Students have the option of making up classes by attending the same or a similar class
within six months of the missed class at the discretion of the Director for Education and
Training.
If a student’s absences exceed 10% of the scheduled hours in the training program, the
student will get certificates for the individual courses they completed. Moreover, ATIC will
notify the VA to terminate the payment of educational benefits and will notify the
government to cease processing of the student’s security clearance request.
Enrollment Dates
Students may apply for training programs at any time. All application materials are due two
weeks prior to the start of any program.
Leave Policy
ATIC does not allow a leave of absence. Any student missing more than 10% of scheduled
classes is required to withdraw from the training program and may re-apply after one full
calendar year. Re-admission to the training program is not guaranteed and is addressed on
a case-by-case basis. Students re-entering the program will be subject to any updated
admission procedures, policies, and fees.
Tardiness Policy
Any student reporting for a class more than 15 minutes late will be considered tardy. Three
tardies will be counted as one unexcused absence.
Make-Up Work Policy
36
Students are responsible for attending all class sessions offered during the training
program. If a student must miss any section of the training program for any reason, the
student must make every effort with the instructor and the ATIC staff to make up any
assignments not completed. Students have the option of making up classes by attending
the same or a similar class within six months of the missed class at the discretion of the
Director for Education and Training.
Advanced Technical Intelligence Center for Human Capital Development
2685 Hibiscus Way, Suite 110 Beavercreek, Ohio 45431
(937) 429-7601 [email protected]
© ATIC HCD, 2013-2014. All rights reserved.
37