CDIC Initiations Training
CDIC Initiations Training is the mandatory on-boarding program that equips every new member with the foundational knowledge, operational discipline, and security mindset required to operate effectively and securely within the Cyber Defense and Intelligence Center.
About This Course
The Cyber Defense and Intelligence Center (CDIC) Initiations Training is the official entry point for all new members, volunteers, interns, and analysts joining our 501(c)(3) nonprofit dedicated to cyber defense, threat intelligence, and cybercrime investigations. This self-paced course provides a comprehensive orientation to CDIC’s mission, core values, organizational structure (including the Cyber Tactical Operations Command – CTOC), and the “Cyber Quadfecta™” framework (Security, Forensics, Intelligence, Response) that defines our operational excellence.
By completing this course, new members will understand how to maintain strict confidentiality, apply Extreme Ownership principles, utilize approved tools and communications platforms (Microsoft Teams), and prepare basic intelligence products using the standardized report format.
Whether you are stepping into a Cyber Intelligence Analyst (FIELD07B), Security Engineer, Programmer, or support role, this course builds the shared operational culture and tradecraft discipline necessary to protect digital frontiers and support law enforcement, military, and corporate stakeholders.
What You'll Learn
- By the end of CDIC Initiations Training, participants will be able to:
- Articulate CDIC’s mission, vision, core values, organizational structure, and the role of the Cyber Tactical Operations Command (CTOC) within the broader Cyber Quadfecta™ framework.
- Identify and correctly apply CDIC classification levels, security scopes, and handling protocols for sensitive, classified, and CYBER DARK materials, including time-sensitive threats, criminal evidence, and CSAM incidents.
- Demonstrate understanding of CDIC OPSEC requirements, Security Standards Directive, and mandatory pre-, during-, and post-operation checklists.
- Explain the CDIC Cyber Operations Workflow (TASKORD process), Field Operations Coordinator (FOC) responsibilities, and the principles of Extreme Ownership within the chain of command.
- Apply ethical guidelines and “Lane of Fire” principles to intelligence gathering activities while recognizing prohibited actions.
- Utilize approved communications platforms (Microsoft Teams) and naming conventions while maintaining strict operational security.
- Outline the standardized intelligence report creation process and recognize the importance of artefacts, BLUF, and estimative language in CDIC deliverables.
- Identify personal responsibilities under the Non-Disclosure and Sensitive Information Agreement and CDIC’s conflict-of-interest policy.
Course Curriculum
Assessments
Final Confirmation
1 questions • 70% to pass
Prerequisites
All new CDIC members, volunteers, and analysts.
Instructors
Kristie Arciszewski
Super_Admin
Jonathan Williams
Super_Admin