UC Tech Academy: Applied Intelligence Mentorship Program  

Woman lecturing

The Applied Intelligence Mentorship Program provides cyber security professionals the skills they need to improve existing Cyber Threat Intelligence (CTI) products and work streams, while developing professional networks with peers for ongoing collaboration. This program is part of the UC Tech Academy, described below. The UC Tech Applied Intelligence Mentorship (AIM) program is offered through a partnership between the UC Cyber-Risk Coordination Center and Mandiant, an American cybersecurity firm and a subsidiary.  This program is part of the UC Tech Academy, described below. 

Key facts

  • Program Name: UC Tech Academy: Applied Intelligence Mentorship Program  
  • Timing/Dates: Eight-month program with monthly modules 
  • Audience: UC cyber threat intelligence (CTI) practitioners who are nominated by chief information officers each year
  • Sponsor: Van Williams and the UC CIO Council 
  • Format and Location: Virtual program consists of monthly modules, each addressing a different topic and requiring about 12 hours to complete (equivalent to about 3 hours each week during the month).
  • Contact: Kristin Cordova (see contact details, below) 

Program details

Target audience and nomination process 

Twelve individuals across UC locations who are cyber threat intelligence (CTI) practitioners. They are selected based on their ability to benefit from the program. The process for candidate nomination is managed locally by each CIO Council representative, based on the following criteria: (1) the positions “own” the CTI function, or who work in related CTI functions, including incident response, the security operations center, or risk management; (2) at least three years of experience working in a CTI related role; (3) comfort with representing their CTI team and sharing atmospherics, insights, existing workflows, processes, and previously produced products. 

Program learning objectives 

Participants will learn the fundamentals of cyber intelligence and cyber risk; how to build and lead a cyber threat intelligence program; cyber threats and intrusion (CTI) sets; communicating threat intelligence analysis effectively; how to collect, extract, store, and analyze cyber threat information; the cyber threat profile and Cyber Threat Intelligence (CTI) frameworks; threat enrichment and attribution analysis; and cyber threat feeds, automation, and Indicator of Compromise (IOC) aging. 

Program logistics 

This eight-month virtual program consists of monthly modules or workshops, each addressing a different topic and requiring about twelve hours of commitment. 

About the UC Tech Academy 

This program is part of the UC Tech Academy, a suite of professional development programs for the UC Tech community. These programs support a range of job levels, and are generally open to the entire UC Tech community, consisting of professionals across the university who work in IT. Each program has specific nomination/application processes and criteria. Learn more about the programs that make up the UC Tech Academy by visiting UC Tech Academy Overview.

Contact 

Kristin Cordova
Kristin Cordova
Chief of Staff
UC Office of the President

Program Director, UC Tech Academy
Kristin.Cordova@UCOP.edu