What Students Will Learn
Professional and academic discourse around radicalization with the intent to disrupt, isolate, and dismantle terrorist organizations.
How religious extremists use social media and social networks to recruit.
The do’s and do not’s of government (including military) response to recruiting by religious extremists.
How to read social media profiles of potential targets to understand the human terrain.
The use of scripture by religious civil society to combat and suppress extremism.
Final hands-on exercise lab and testing.
Time Frame: 1 Day
Course Pricing: $1,300 per student
Certification: RCCJOA
Minimum Number of Students: 8
For more information please contact CSFI at: contact@csfi.us
Course Outline
World History and Islam 101
Learn about the world from a macro-level to understand political & cultural contexts that shape our globe
Learn about Islam specifically: origins, beliefs, empire expansion and contact with Christian Europe
Terrorism from talk to action, The Toronto 18 Terror Plot
See from a real-life example of a terrorist plot and how a group of youth moved from talk to action
Notes and commentary on human intelligence operations in counter terrorism prosecutions
Identifying vulnerable persons guide for LE: patrol officers, border control, analysts, operators and managers
The A to Z of ISIS
Recruiting of males, females and child soldiers, propaganda, incitement & attack methods etc.
Discussion of the concept, “Terrorism in Islamic Costume” with extensive references to Islamic Scriptures
Catalog of ISIS attacks: how to learn from past incidents
Red Team Exercise
Malware Analysis Hands-On Lab (OSINT techniques) – Syrian Electronic Army (SEA)Tactics, Techniques, and Procedures (TTPs).
“Terrorists employ the Internet for recruiting, training, motivating, and synchronizing their followers. The enemy frequently operates essentially unrestrained and is free to innovate and exploit its potential. Cyberspace provides new and important means and methods to collect and process large amounts of information on the local populace and insurgents.”
Joint Pub 3-26 Counterterrorism
The end state of CSFI’s unique Radicalization and Counter/Cyber Jihadist Operations Analyst (RCCJOA) training and certification is to support the warfighter, the intelligence community, and law enforcement to strategically defeat terrorist organizations and their affiliates and adherents through the use of cyberspace.
Notice
CSFI screens all applications and will not allow any applicant whose name appears on the U.S. Department of the Treasury’s Office of Foreign Asset Controls (OFAC) Specially Designated Nationals (SDN) List or on OFAC’s Consolidated List to enroll in a CSFI-sponsored course.