**We regret to say that we will not be holding the Summer 2020 IACT course.

Please continue to check our course website for future dates of the Intelligence Analysis Career Training program, or reach out to our training staff at **

The dedicated people who work within the US Intelligence Community, Military, and Law Enforcement are committed to strengthening our domestic and national security.  We are excited to help with your educational development to become part of this dynamic community!

IACT incorporates a hybrid instructional method that includes lectures, readings/journal entries, and practical exercises aimed at teaching critical thinking skills, structured analytic techniques, and writing and briefing in the intelligence style. Instruction includes utilization of experts in the field of intelligence analysis to provide more in-depth lessons on issues in various functional intelligence disciplines, such as:

  • terrorism, transnational organized crime, and other law enforcement specialties,
  • air force, air defense, missiles and space, and other NASIC-related specialties, and
  • regional and functional Intelligence Community areas, such as military analysis, WMD threats, and cyber analysis.

We also do site visits, professional development work, and bring in potential employers to describe what they do and what they are looking for in prospective hires. Our program finishes with a 4-week-long experiential learning program focusing on law enforcement analysis.

As part of the program, qualifying students are submitted for a Single-Scope Background Investigation.  This 10-year background investigation is an examination of certain variables of an individual’s life to make a determination if the person is an acceptable security risk.  The following areas are evaluated on a “whole person” basis: allegiance to the United States; foreign influence; foreign preferences; sexual behavior; personal conduct; financial considerations; alcohol consumption; drug involvement and substance misuse; psychological conditions; criminal conduct; handling protected information; outside activities; and use of information technology.