Training and Professional Development

Education concept: Training on computer keyboard backgroundIIT professional development programs provide you with the tools to identify gaps in your internal stakeholder awareness, design organization specific solutions, and measure results. Using extensive knowledge sharing and information transfer experience, and through experience with adult learning techniques and methodologies, IIT designs training programs that maximize knowledge transference, information retention, and education return on investment.

IIT has a full range of capabilities to develop and deliver training and education including, technical training, college and advanced degree education, and everything in between. A full spectrum of delivery techniques is available, from individualized platforms to the most sophisticated interactive web-based methods.

In addition to development services, IIT currently offers training programs in the following categories:

Computer Emergency Response
CERT OTE
OTE: The Operational Training Exercise (OTE) is an intensive 14-day course designed to give IO technical personnel hands-on Computer Network Defense training. The OTE course is instructed in a computer lab teaching the practical techniques, procedures, and policy of CND. The final OTE practical exercise finds the students in CND teams working together to defend a real computer network against an opposing force attempting to attack the student network.
Advanced CERT ONE
 The Advanced Computer Response Team (CERT) Operational Training Exercise takes the technical IO soldiers through an intensive hands-on CND scenario, designed to challenge the student teams with the latest technology and technical IO concepts.
Computer Emergency Response Team (CERT) IRH
The Incident Response Handlers (IRH) course is a 40 hour web-based course designed to introduce technical IO Teams to the principals of Computer Network Defense and Information Assurance. The course introduces IO technical concepts for identifying, preventing, and responding to a computer network attack or intrusion.
Consequence Management
Analytical Laboratory System (ALS) Training
The 180 hour Analytical Laboratory System (ALS) Operator Course for new and/or alternate ALS Operators is taught at the Defense Consequence Management Support Center (DCoMSupCen) in Lexington, Kentucky. It prepares Civil Support Team analytical personnel for the ALS Critical Task List and includes:
• CST Overview and ALS Doctrine
• Vehicle Familiarization
• Filtration Theory
• Sample Preparation and Processing
• Advanced ALS HAPSITE Course (40 Hours)
• ALS RAPID Polymerase Chain Reaction (PCR) (16 Hours)
• Basic Microscope Operation and Analysis and PLM Basics (16 Hours)
• Basic IlluminatIR Operation and Analysis, with QualID and Grams familiarization (16 Hours)
• Radiological spectra assessment and Identifinder spectral interpretation (16 Hours)
• Two full days of scenario-based field training exercises (FTXs).
Each section includes evaluated, written checks on learning and evaluated practical exercises. References for evaluation are TM 3-6665-400-10, ST 20-652, the ALS Critical Tasks, and all analytical equipment manufacturer’s manuals and instruction materials. Instructors have years of experience instructing CST analytical personnel.
CBRNE Impacts and Effects Modeling Training
IIT delivers tailored, operationally focused chemical, biological, radiological, nuclear, and high-yield explosives (CBRNE) modeling training. This training includes an overview of weapons of mass destruction (WMD) modeling concepts, processes, and methods used to effectively provide a critical and timely assessment of current and projected consequences resulting from natural and man-made CBRNE hazards. It addresses the effective application of these capabilities during domestic incidents of suspected weapons WMDs. A primary course is designed for National Guard Civil Support Team Modelers, alternate Modelers, Information Systems staff, JFHQ-State and JTF-State staffs, and civil emergency response teams (first responders) and tailored to enhance the modeling capabilities of individual modelers and command interpretation of results.
Employing a National Guard WMD Civil Support Team
This eight-hour course is for National Guard Adjutant Generals, Joint Forces Headquarters staffs, Civil Support Teams (CSTs), emergency managers, and other state response units. The information-packed training overviews the CST structure, equipment, capabilities, operations, and state support requirements. It describes the unique CBRNE mission and capabilities, as well as the centralized and state support requirements for this non-traditional, full-time, forward deployed, force package one unit. It is an excellent introduction for new or prospective CST members.This executive-level course is delivered by an exceptionally experienced, National Guard Bureau approved mobile training team. Each attendee receives a complete course book that is an indispensable reference tool. 
Public Affairs and Crisis Communications
IIT presents this six-hour course for National Guard Joint Forces Headquarters staffs, Joint Task Force-State staffs, Civil Support Teams (CSTs), emergency managers, and other state response units. This crisis-focused training incorporates four case studies of media impact on major crises, helps response personnel understand the media requirements and interests, delineates the methodology to develop appropriate messages that have a positive impact on the outcome of events, and highlights the techniques for delivering those messages in various media formats. This executive-level course is delivered by an exceptionally experienced training team. Each attendee receives a complete course book that is an indispensable reference tool. Senior personnel receive on-camera interview training.
Critical Infrastructure Protection
Critical Infrastructure Protection Course
This course is for owners and operators of critical infrastructure, state civil and military analysts, information teams, critical infrastructure protection teams, WMD response teams, and others involved with security, homeland defense, risk reduction, and decision making for U.S. critical infrastructure. It provides overviews of the concepts, processes, and methodologies used to reduce risk to the critical infrastructure. The agenda includes:
• Course Introduction and Overview
• Homeland Security Policies and Strategies
• Critical Infrastructure
• Emergency Management Systems
• Information Operations
• System Security Engineering
• Assuring Operation of the Critical Infrastructure
• Risk Management Evaluation Tools
• Identify Critical System Assets
• Identify Threats to the Systems
• Identify Critical Infrastructure Vulnerabilities
• Calculate Risk and Make Decisions to Reduce Risk
• Implement Countermeasures and Actions to Reduce Risk
• Identify and Protect Interrelated Systems of the Critical Infrastructure at the Private, Local, County, and State Level
• Risk and Vulnerability Assessment Practical Exercise 1
• Risk and Vulnerability Assessment Practical Exercise 2
• Course Summary/Critique
• Final Examination and Certification
Recommended length – 24 hours
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
Introduction to Operations Security (OPSEC) for Managers
This course provides supervisors and managers with an overview of the OPSEC process and techniques to protect sensitive and critical activities. Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by adversary intelligence systems, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information. The focus of this course is application of the five-step OPSEC process within a government organization or private industry. After successful completion of this course, the participant will be able to understand the OPSEC Process, implement an OPSEC Program in their organization, identify Critical Information and understand the threat.
Recommended length – 16 hours
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
Using Carver for Target Analysis and Vulnerability Assessment
During the Using CARVER for Target Analysis and Vulnerability Assessment Course, you will learn how to plan, execute and conduct a vulnerability assessment using CARVER. The course reviews the basic elements of planning, executing, and reporting an assessment and countermeasure development. The Department of Defense uses CARVER as an offensive target analysis tool and it has become a very effective defensive tool for Critical Infrastructure Protection. The course includes a series of classroom lectures, practical exercises, and attendees will conduct an actual vulnerability assessment of a government or private sector facility.
Clients who bring this course onsite to their facility will be able to have the vulnerability assessment conducted at their facility (a $15K value!).
Recommended length – 24 hours
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
Risk and Vulnerability Assessment Boot Camp
The Risk and Vulnerability Assessment Boot Camp trains you on the skills to plan and conduct a risk and vulnerability assessment using the basic risk assessment methods and the CARVER vulnerability assessment tool. The intensive course curriculum includes the techniques of planning, executing, and reporting an RVA, the CARVER Vulnerability Assessment Tool, and countermeasure development. The course includes a series of classroom lectures, practical exercises, quizzes, homework assignments, and conducting a vulnerability assessment workshop of a government or private sector facility.
Day 1 – Assessment Planning and preparation
Day 2 – Analysis tools and CARVER methodology
Day 3 – Assessment preparation and field trip to a critical facility
Day 4 – Analysis of field trip data and Countermeasure Selection
Day 5 – Assessment reporting, security technologies, certification test
Required length – 5 days
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
Enterprise Security Course – Using an Effective Security Model to Identify and Protect Sensitive and Proprietary Information and Activities
This course provides you with the training and skills to identify your sensitive and proprietary information and activities, analyze threats, assess the vulnerabilities to your information and activities, and implement appropriate countermeasures. The workshop provides hands on performance of proven techniques to protect critical information and activities within your organization. The Enterprise Security model is based on the successful operations security program implemented within Government and Military organizations. Based on lessons learned and experience, the Enterprise Security model can easily be applied within public and private organizations to obtain and maintain essential secrecy.
Recommended length – 24 hours
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
Function Modeling for Security and Disaster Recovery Planning
This course provides you with the training and skills to utilize IDEF0 Function Modeling and Information Flow mapping techniques. The course is designed to enable you to effectively employ these techniques when conducting vulnerability assessments and Continuity of Operations Planning. You will be able to successfully model a business function, identify critical assets and vulnerabilities, identify critical functions and assets for business impact analysis, successfully map information flow, and identify vulnerabilities in information flow.
Recommended length – 16 hours
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
Developing Effective Physical Security Measures
This course provides you with training and skills to develop effective countermeasures given a set of vulnerabilities. This training reviews the principles of Defense in Depth and the Security Functions of a physical protective system, including an overview of security technologies to design and implement an effective Physical Protection System. You will be able to identify countermeasures, conduct a cost benefit and trade off analysis, select appropriate countermeasure sets to mitigate vulnerabilities, and describe the function, characteristics and applications of common security technologies.
Recommended length – 16 hours
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
Open Source Tools and Applications for Vulnerability Assessments
Need to do more with less? Have you had a downsizing in security staff?
This course provides you with the training, skills, and resources to use a collection of open source planning, analysis, and 3D Visualization applications to improve the analysis and results of a vulnerability assessment, assessment reports, and security program management. After successful completion of this course, you will be able to utilize Mind Mapping techniques for assessment planning, execution, reporting activities, and security management, construct simple 3D graphic files for vulnerability assessments activities and reporting, and utilize mapping applications for vulnerability assessments.
Recommended length – 16 hours
(Note: Students are required to bring a laptop)
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
OPSEC Program Managers Course
This course provides you with the training and skills to implement and manage an OPSEC program to protect critical activities within your organization. The course includes a classroom exercise to develop firsthand experience in the OPSEC Process. You will be able to implement and manage an OPSEC Program in your organization, identify Critical Information, understand the threat, conduct a Risk Assessment, develop OPSEC Countermeasures and implement OPSEC Measures to protect sensitive information and critical activities.
Recommended length – 24 hours
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
Information Operations
IO 101 Training
IO 101 is an introductory 40-hour web-based course designed to provide an overview of IO national, joint, and service Information Operations concepts, techniques, and doctrine. IO 101 serves as the baseline prerequisite course for students entering the IO career field in ARNG. IO 101 provides the critical foundation for the entire Information Operations Curriculum.
IO 210 Training
IO 210 is a 10-day resident based course designed to instruct IO soldiers on tactical IO planning, concepts, techniques, procedures, and assessment. It is a critical course for IO soldiers’ assigned to Division, enhanced Separate Brigade IO sections, IO Field Support Units, and Vulnerability Assessment Units. This course has also been modified to support specific training for units deploying.
IO Functional Area 30 Training
The FA 30 Course challenges students to learn, understand, apply, and analyze Army IO doctrine and TTP across the spectrum of conflict. The course includes an examination of information management (IM) and an in depth study of IO, including the elements of offensive and defensive IO.These elements are studied from the perspective of the IO Officer, who has integration, coordination, and synchronization responsibilities at the Division and Corps staff levels. They include OPSEC, Deception, EW, PSYOP, Civil Affairs, Public Affairs, and Physical Destruction. Essential blocks of instruction on IO Targeting, IO Intelligence Preparation of the Battlefield (IPB), and developing IO doctrine (FM 3-13) are also included in the course presentations. Special emphasis is placed on IO planning and planning products within the framework of the Military Decision Making Process (MDMP). Students develop their IO planning skills and demonstrate their knowledge of IO in a series of practical exercises (PE’s) and product development exercises. This training experience prepares the students for assignments at the tactical and operational echelons where they are expected to plan, coordinate, integrate, and synchronize IO activities.
Information Engagement (Basics Course)
This two (2) day introductory level course will provide participants with a basic ground work familiarization with the fundamental of information engagements. The basic information engagement definitions, desired effects, tools, and contributing capabilities will be presented. Participants will participate in sixteen (16) hours of seminar discussions, active questioning, and concrete practical exercises to develop the ground work for understanding information engagement. The seminar focus will highlight understanding the basics of integrating information engagement capabilities and tools to achieve measurable results.
• Approximately two (2) hours of reading and out of class study are required.
• Seminar topics will be drawn from Army Field Manuals FM 3-0, Operations, FM 3-13, Information Operations, and Joint Publication JP 3-13, Information Operations.
• Potential Participants: Military Staff Personnel (Joint and Army), Defense Contractors, media personnel, public relations staff, Federal and State Public Information Officers (PIO’s), other state and federal staff members involved in public policy and public communications.
Information Engagement (Practitioners Course)
This four (4) day practitioner level course will provide participants with solid grounding in the specific tools and capabilities that are used in creating information engagement effects. Methodologies, techniques, and tools will be presented to integrate and coordinate the use of information to achieve measurable results. The process of developing measures of effectiveness (MOE) and measures of performance (MOP) will be trained and exercised in this seminar / workshop. Extensive use of practical exercises and planning activities will be included.
• Approximately four (4) hours of reading and out of class study are required.
• Seminar topics will be drawn from Army Field Manuals FM 3-0, Operations, FM 3-13, Information Operations, and Joint Publication JP 3-13, Information Operations.
• Reading Lists and Professional self development tools will be provided.
• Potential Participants: Military Staff Personnel (Joint and Army), Defense Contractors, media personnel, public relations staff, Federal and State Public Information Officers (PIO’s), other state and federal staff members involved in public policy and public communications.
Intelligence
Intelligence Analyst Training Course – Techniques for Analysis Centers and Critical Infrastructure Protection
This course focuses on analyzing raw data to produce actionable intelligence. You will learn who the threat is, how they operate, how to analyze data, and how to use the results to protect your employees, stakeholders, and critical assets. This workshop is an introduction to threat analysis, the intelligence cycle, and basic analytical techniques.
Recommended length – 16 hours
National Incident Management System (NIMS)
National Incident Management Systems - Incident Command System 100 (NIMS-ICS 100)
The NIMS-ICS 100 is an introduction to the Incident Command System (ICS) and provides the foundation for a higher level of ICS training. This course describes the history, features and principles, and organizational structure of the Incident Command System. It also explains the relationship between ICS and the National Incident Management Systems. Upon successful completion of this course, the participant will understand the basic components for a successful means of managing an incident.
Recommended length – 8 hours
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
National Incident Management Systems - Incident Command System 200 (NIMS-ICS 200)
The NIMS-ICS 200 is designed to enable personnel to operate efficiently during an incident or planned event within the Incident Command System (ICS). This course focuses on the management of single resources. The NIMS-ICS 200 course provides training on and resources for personnel who are likely to assume a supervisory position within the ICS. Also, participants will learn the different positions within the ICS so that they will be able to assume any ICS position.
Recommended length – 12 hours
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
National Incident Management Systems - Incident Command System 300 (NIMS-ICS 300)
The ICS-300 course provides training on and resources for those personnel who require advanced applications of the Incident Command System. This course expands upon the ICS-100 and the ICS-200 courses. The prerequisites for the ICS-300 course is for each participate must successfully complete the ICS-100 and the ICS-200 courses. The main focus of this course is to those individuals who may assume a supervisory role in an expanding incident or a Type 3 Incident. A Type 3 event will require some or all Command and General Staff positions to be activated. Also, this Type 3 incident will/may activate Division/Group Supervisor and /or Unit Leader level positions. The incident or event could extend into multiple operational periods. Examples would be: tornadoes, floods, snow storms etc.
Recommended length – 24 hours
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com
National Incident Management Systems - Incident Command System 400 (NIMS-ICS 400)
This course provides training on and resources for personnel who require advanced application of the Incident Command System. Those who are in senior positions in the organization and who would take any Command or General Staff position should consider this course. The audience that is targeted is those senior managers who are expected to perform in a management- Command or General Staff- in an Area Command or a Multiagency coordination entity. This course expands on the ICS-100, ICS-200 and the ICS-300. All three (3) courses shall be taken as prerequisite for the ICS-400.
Recommended length – 16 hours
For more information, contact Gary Williams at 703.478.7634 or gwilliams@ewa.com