- Assess the evolution, structures, functions, capabilities, and activities of the national intelligence community.
- Evaluate the fundamental capabilities and limitations of intelligence collection.
- Analyze the foundation and application of psychological concepts to the study of intelligence analyses.
- Demonstrate proficiency in the use of selected research methods and tools.
American Public University is part of American Public University System, a regionally accredited university offering more than 100 degree and certificate programs at the associate, bachelor's, and master's levels. All courses are online, so students have the flexibility of taking classes any time or any place that fits their schedule. Our degree programs are designed to be challenging and relevant to working adults in both the public and private sectors and can help enhance their current career or prepare them for a career change.
Students come to our university from across the globe with varying educational backgrounds and diverse educational and career goals. Choose the category below that best describes you:
Our 5-step admissions process will allow you to apply for admission, complete your new student orientation, request a transfer credit evaluation, apply for Federal Student Aid, and register for classes. Get started today!
Our admissions staff is available Monday - Thursday from 8:00 a.m. - 7:00 p.m. and Friday from 9:00 a.m. - 4:00 p.m. ET to answer your questions and provide assistance with the admissions process. You can reach us by phone at 877-777-9081, e-mail us at firstname.lastname@example.org, or connect with us via Live Chat.
Research Methods in Security and Intelligence Studies-Intel Majors
Learn basic research methods skills for addressing security and intelligence studies problems and issues. You focus on the detailed procedures for conducting qualitative case studies, which is the foundation for most basic security and intelligence research conducted in academic, government, and business circles. You become well versed in research planning, secondary data collection, and qualitative data analysis methods and how these methods relate to the larger field of social science research. You will also learn the analysis of competing hypotheses approach to research design. You are also introduced to basic social theory which supports security and intelligence research. The course prepares you for later learning intermediate and advanced security and intelligence methods. This course is required as the first course in the MA in Intelligence Program.
RECOMMENDED AS SECOND PROGRAM COURSE.
This course examines the current structure, function, capabilities, and contributions of individual U.S. national intelligence community members. Students appraise the intelligence cycle by an overview of the intelligence planning, collection, exploitation, analysis, production, and dissemination phases. The course also evaluates the intelligence oversight system, the restrictions on national intelligence community activities prescribed by federal law, executive and agency directives.
This course is a study of intelligence collection and information gathering. It focuses on a variety of aspects related to how both the United States and foreign nations gather and process intelligence. The student will develop a comprehensive understanding of the role collection plays in the intelligence community, how various policies affect collection, and how different intelligence agencies monitor and collect intelligence.
This course provides an overview of intelligence analysis. It first explores the nature of human thought processes: why we think the way we do, and the many analytical, perceptual, and cognitive errors we frequently make in conducting our own analysis. The student is also provided a foundation from which to understand and conduct critical analysis. With this foundation, students are then given a series of historical case studies to examine and analyze.
This course is a study and analysis of international threats to security. It focuses on a variety of aspects related to both U.S. and foreign threat analysis and action, including the evolution of responses to threats, perspectives on threat action since World War II, principles of threat analysis and response, and assessments of successes and failures of such actions. The student will develop a comprehensive knowledge of threat analysis, how intelligence agencies in the U.S. assess and counter international threats in order to guard U.S. global interests and protect U.S. national security from adversaries, and how various threats affect national security policy and decision-making.
Choose one of the following:
This course provides an introduction to the theory and practice of intelligence operations. The course will focus on the intelligence resources necessary to carry out the full range of intelligence operations using the tools, techniques, and resources available to intelligence agencies.
The course focuses on both U.S. and foreign aspects of counterintelligence, including the history and evolution of counterintelligence, the differences between passive and active CI measures, principles and processes of counterintelligence and its relationship to covert action, the ethics of counterintelligence, and the evaluation of CI successes and an estimate of the damage caused by failures. The student will develop a comprehensive knowledge of the use and practices of counterintelligence, especially in protecting homeland security and national security interests against foreign adversaries. Additionally, the collection process and the changes for the future in the infusion of CI technology will be discussed.
This course provides an overview of the analysis of political leaders. It explores various political psychological approaches to studying leaders to include biographies, psychoanalysis, traits, characteristics and motivations. Examples of specific political leaders are discussed throughout the course to offer the student a broad knowledge of world leaders. The course also provides students with a solid foundation from which to conduct their independent analysis of political leaders.
This course addresses the core elements of Information Operations (IO). Students will be introduced to the core IO disciplines referred to as Electronic Warfare (EW), Computer Network Operations (CNO), Psychological Operations (PSYOP), Military Deception (MILDEC), and Operations Security (OPSEC). Students will also be introduced to supporting IO disciplines of Information Assurance (IA), support to Civil-Military Operations (CMO), support to Public Affairs (PAO) and support to Public Diplomacy (PD).
Transnational Crime and Narcotics
This course will provide an overview of transnational crime and narcotics and its effects on national security, political, social, and economic development of countries around the world. The focus of this class will be the proliferation and expanding influence of organized crime groups, the increasing links among crime groups, corruption, and links to terrorism from transnational crime and narcotics. This class will examine the diverse dimensions of transnational crime and narcotics in the context of increasing globalization and the exponential impact of technology advances