CISA INTELLIGENCE COURSE OUTLINE

A. Introduction to Intelligence
B. The distinction between Intelligence and Information
C. Types of Intelligence
D. The use of Intelligence.

A. Definition of an Agent
B. Distinguishing features of an Agent, Contact & Source
C. Mode of recruitment of Agents
D. Agent Circle
E. Handling of Agents
F. Termination of Agents

A. Types of Intelligence collection methods
B. Processes and Procedures of Collection
C. Strengths and Weaknesses

A. Definition of Intelligence Cycle
B. Stages of the Intelligence Cycle
C. Methodologies and Techniques
D. Strengths and Weaknesses
E. General assessment of the cycle

A. Introduction to analytical intelligence report
B. Techniques of intelligence report writing
C. Practical training on intelligence report writing

A. Definition of surveillance
B. Types of surveillance
C. Methods of surveillance
D. The use of surveillance in intelligence

8. TARGET ANALYSIS

A. Definition of target analysis
B. Profiling of target
C. Positive vetting
D. Due diligence
E. Communication and Reporting

A. Definition of Social Media
B. The use of social media in intelligence gathering
C. Relevance of social media in modern intelligence
D. Knowledge and skills in assessing, managing & mitigating risks of social media.

A. Definition of Counterterrorism
B. The main Counterterrorism groups (Leaders & their formation)
C. Social Networking and counterterrorism
D. Overview of Counterterrorism Threats
E. Implications of Counterterrorism on Nation States
F. Counterterrorism legislation – Comparative analysis
G. Challenges and the way forward

A. Introduction to cybersecurity
B. Cybersecurity threats, vulnerabilities and attacks
C. Securing networks and critical infrastructure
D. Protecting Data and Systems
E. Security policies and procedures
F. Education and Case Studies

A. Key essentials that give rise to national contingency and evacuation
B. The rationale for National contingency and evacuation
C. The rationale for international contingency and evacuation (foreign missions abroad)
D. The core elements of the evacuation plan
E. The role of Stakeholder engagements

A. Introduction to Country Risk Analysis
B. Trend analysis
C. Threat analysis
D. Production of intelligence estimates
E. Security Risk Assessment and Management
F. Country Risk Assessment Report

A. Introduction to Clandestine Communications
B. Communication Equipment as a Potential Security Threat
C. Electronic Surveillance Tools
D. Electronic Surveillance by Law Enforcement Agencies
E. Emerging Trends (Technology & AI)

A. Definition of National Security
B. Key terms and their definitions - Sovereignty & Territorial Integrity
C. Approaches to National Security – Traditional Security (Regime) vs Human Security
D. Traditional Security Challenges – Espionage, Sabotage & Subversion
E. Current security threats – Armed robbery, Drug trafficking, Terrorism, illegal Mining, Cybercrime/Financial sector related crimes, Unemployment & Poverty, Social media, Political Vigilantism, Maritime piracy/Illegal bunkering, Infrastructure Deficit, Small arms proliferation, irregular migration etc.

A. Vienna Convention on Diplomatic Relations 1961
B. Vienna Convention on Consular Relations and Optional Protocols 1963

A. Introduction to policy development and the policy cycle
B. Role of NGOs and think tanks as civil society organisations
C. Grassroots participation and mobilisation
D. Case studies

A. Introduction to Media and Policy
B. Media Types and Policy Impact (Traditional, Social and Digital)
C. Dangers of Misinformation and Disinformation
D. Fact checking
E. Challenges and Future Directions

A. Introduction to Parliamentary Oversight
B. Accountability and Transparency in the Security and Intelligence Sector
C. Committee capacity and Effectiveness
D. Case studies

A. Introduction to Security for Corporate organisations
B. General Security Awareness
C. Intelligence Gathering and Engagement
D. Customer service and security ethics
E. Case Studies

A. Introduction to VPSHR
B. Critical Issues in the mining industry
C. The Voluntary Principles and Security Challenges
D. Community Engagement and Intelligence Gathering
E. Challenges and Emerging Issues

A. Introduction to Health and Safety
B. Risk Assessment and Management
C. Emergency preparedness
D. Hazards and Incident Reporting
E. Environmental sustainability
F. Communication and safety culture

A. Introduction to Crowd Management
B. Crowd Dynamics, Risk Assessment and Planning
C. Crowd control techniques
D. The use of technology in crowd management

A. Introduction to Aviation Security
B. Risks, Security Measures and Procedure
C. Security Operations Management
D. Case studies

A. Introduction to Maritime Security
B. Waterways and Coastal Management
C. Border Security Management
D. Threats and responses in Border, Maritime and Coastline management
E. Emerging threats and future challenges

A. Training in Enhanced Search Methods
B. Training in Undertaking Night Patrols
C. Practical Training in Profiling and Observation
D. Practical Training in Security Procedures and Lockdown Protocols:
• Archway Metal Detector (AMD)
• Body Search (EU Approved Standard)
• Use of the Handheld Metal Detector (HHMD)
• Luggage Search
• Vehicle Search
• Close protection
• Security sweep
• Zonal mapping and security survey

Apply for upcoming lectures.

BASIC LEVEL

6 May – 31 May 2026

2,250
| 30 Credit Hours

Start strong with the essential principles of intelligence and security.

This intensive programme introduces you to the core concepts, tools, and frameworks used by intelligence and security professionals across public and private sectors.

You Will Gain:

Ideal for:
Aspiring analysts, corporate security staff, compliance officers, graduates, and professionals transitioning into security roles.

And Earn a Certificate in Basic Intelligence Proficiency
ADVANCED LEVEL

3 June – 28 June 2026

3,550
| 30 Credit Hours
| Early Bird: GHS 3,250

For experienced professionals ready to operate at a higher strategic level.

This programme sharpens analytical judgement, strengthens operational awareness, and prepares you to assess complex national and international security risks.

You Will Explore:

Ideal for:
Government and defence analysts, intelligence professionals, policy advisors, researchers, and senior risk consultants.

And Earn a Certificate in Advanced Intelligence Analysis
EXECUTIVE LEVEL

Delivered on Request | Fees Negotiable

Lead Security. Shape Policy. Drive Strategy.

Designed exclusively for senior leaders and decision-makers.

This high-level programme addresses security governance, oversight, and executive decision-making in high-risk environments.

Focus Areas Include:

Ideal for:
Senior government officials, security directors, military command staff, diplomats, corporate executives, and policy leaders.

And Earn an Executive Certificate in Security and Intelligence.
Better Solutions and Training