Training and Instruction following Intelligence Community Tradecraft

Our courses start at Strategic and run through Technical. "I completed Treadstone 71’s Cyber Intelligence Tradecraft Certification Training in March 2018. Although I had attended numerous cyber training courses in the past, I found this course to be the best cyber training course ever...." March 2018 "Spent years in the intelligence community and know my stuff. This course hits the mark and expands into the cyber environment unlike what the government teaches..." February 2019

  • Analytic Writing, Reporting, & Dissemination
  • Cyber CounterIntelligence Tradecraft - Certified Threat CounterIntelligence Analyst
  • Cyber Intelligence Tradecraft - Certified Threat Intelligence Analyst
  • Intelligence for the C-Suite
  • Open Source Intelligence
  • Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
  • Structured Analytic Techniques
  • Blended and Specialized Training

Treadstone 71

  1. Beacon Series on Defining Intelligence
  2. What is a TIP?
  3. What Intelligence Can and Cannot Do
  4. Intelligence is a Team Sport
  5. What is a PIR?
  6. Ten Areas to Help Get Your Program Going
  7. The Pros and Cons of Putting Your Intelligence Function in the SOC
  8. Analytic Rigor
  9. The Cyber Intelligence Capability Maturity Model
  10. We See What Others Cannot
  11. Our Methods for Cyber Threat Intelligence
  12. Don't Live in Quiet Desperation

The Treadstone 71 Cyber Intelligence Tradecraft Certification course includes:

Anonymity and Passive Persona setup Production Methods Estimation and Forecasting
Collection Methods and Techniques Structured Analytic Techniques – Their use Campaign analysis
Collection Planning, IRs/PIRs/EEIs/Indicators/SIRs Adversary Denial and Deception Types and Methods of Analysis
Collection Process Flow Source Credibility and Relevance Synthesis and Fusion
Collection (OSINT) Tools and Targeting Source Validation Analysis of Competing Hypothesis
Threat Intelligence Denial and Deception Inductive/Abductive/Deductive Reasoning
Most likely Threat Actors Confidence Levels Stakeholder Identification, and Analysis
Access to ThreatStream during the class Types of evidence Analytic Writing, BLUF, AIMS Production Management Forecasting in your writing
Use of Maltego – overview Critical and Creative Thinking STEMPLES Plus
OPSEC – VPNs, Buscador, Authentic8 Silo Cognitive Bias Indicators of Change
OSINT Browser – Oryon C Portable Glossary and Taxonomy Argument Mapping
Proxy Access – the DarkNet What Intelligence Can and Cannot Do Types of Reports
Demonstration – Recorded Future / Intel471 Use of Mitre ATT&CK in Analysis Product Line Mapping
Burn phone setup and use (US Only) ATT&CK in examining patterns and trends Report Serialization, and Dissemination
Open Source Intelligence OSINT ATT&CK in Adversary tendencies Live Case Studies – Class briefs

Lecture, Hands-on, Apprenticeship, in-class exercises, student presentations, analytic products, templates, course material—40 CPEs