Strategic Intelligence Analysis - Estimative and Warning Intelligence - 10 Weeks - Intense and Rewarding
From adversary cyber warfare methods to building your intel program
Create models on your adversary - their capabilities, intent, and motivations.
This is the part 1 instruction lays out the roadmap for a mature cyber intelligence program
An in depth look at the different types of analysis and how they work in intelligence analysis.
This section covers the functions and capabilities for an essentional cyber intelligence program.
Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time
Cognitive and Information Warfare tactics, techniques, and methods from the Chinese Perspective
Cyber Cognitive Warfighter
Cognitive Warfare Some definitions and concepts - Cyber Psyops
Using your knowledge of stakeholders, adversaries, and intelligence requirements, create a collection plan and manage it!
What are color revolutions and what role does cyber cognitive warfare play in them.
Weaponizing Theories to Divide
The building blocks of intelligence analysis and the pitfalls you may encounter
Certified Cyber CounterIntelligence Analyst – Cryptocurrency Investigations arms professionals with practical tradecraft for pursuing threat actors across blockchains. Over eight to twelve weeks, learners progress through on-demand video, interactive labs, and downloadable reference packs while maintaining operational security behind personalized GPT assistants. Syllabus spans persona construction, Dark Triad behavioral profiling, structured analytic techniques, deception planning, and offensive countermeasures, then drills into Russian and Chinese tactics as well as North Korean cryptocurrency raids. Hands-on walkthroughs of Hunchly, blockchain fraud schemes, and influence-operation dirty tricks build investigative muscle memory that endures under pressure. Completion grants Treadstone 71 certification and CPE credit recognized by professional associations.
Applying Cyber to the FBI Counterintelligence Program - Cointelpro - Cyber Psyops
Normally well over $5k! Signup now!
Cyber Intelligence + Counterintelligence Bundle Certified Cyber Intelligence Analyst + Certified Cyber Counterintelligence Analyst (On-Demand) Get Two Flagship Courses. One Bundle. Full-Spectrum Intelligence Tradecraft.
Cyber Intelligence Tradecraft, Certified Cyber Intelligence Analyst, Strategic Intelligence Analysis
The training explores the evolving landscape of cyber warfare, emphasizing its increasingly complex strategies and challenges.
Companies and the DOD have complex supply chains that includes weapons systems and goods.
Cyber Cognitive Warfighter - Denial and Deception
CounterIntelligence and Deception - Dirty Tricks used online
Information Warfare, Types of Disinformation, and Disinformationists
Cyber Intelligence Cert and a sneak preview of Cyber CounterIntel, Cognitive Warfare, and Cyber Intelligence Basics
Understanding TaHiTI and using MaGMa
Generative AI Certified Cyber CounterIntelligence Analyst packs offensive and defensive tradecraft into an eight-to-twelve-week, on-demand sprint. Students tackle real counterespionage missions that hone infiltration tactics, disinformation disruption, insider threat hunting, and deception planning. Generative AI powers persona creation, deepfake spotting, and predictive targeting, giving every learner a private toolkit that accelerates response. Weekly video blocks, graded labs, and live mentoring anchor Russian, Chinese, and Iranian case studies while meeting forty CPE hours. Graduation awards Treadstone 71 certification and lifelong resource access, proving readiness to outsmart adversaries online.
The course is a modern shield forged and built to expose deception and validate identity with brutal clarity. It strips away assumptions, presses for truth, and treats every interview like a counterintelligence operation. Interviewers learn to test claims under pressure, probe for inconsistencies, and force impostors off-script. Video calls aren't just chats—they're forensic tests. From liveness checks to workspace scans, no angle is left unexamined. Candidates must code live, think out loud, and adapt on the fly. Their stories are stress-tested, their voices analyzed, their timelines cross-checked. Each step is layered—psychological pressure, linguistic traps, full-screen audits, cultural nuance. Deep-fakes flicker, voice-clones stumble, coached answers collapse. Even résumés are weaponized—expanded, dissected, and used as bait. This isn't just hiring—it's human vetting at espionage depth, designed to catch what others miss.
Build your intelligence requirements to effectively address stakeholder needs. Learn the right way, here!
Grey zone activities, cognitive warfare actions, info warfare, cyber psyops, & primary APTs
Measuring Iran's Cyber Capability with STEMPLES Plus
Learn the MBTI and how to understand and influence your adversary personas
Learn how to inform quickly with clear, concise, complete, usable, relevant and timely intel
Structured analysis is a mechanism by which internal thought processes are externalized systematically and transparently so that they can be shared. We continually enhance existing techniques while adding new options.
Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time
On Demand - Cyber Intelligence Tradecraft Cyber Intelligence Training Course Newly extended and updated content with Generative AI. On-Demand Cyber Intelligence Tradecraft Certification delivers 52 CPE hours across 15 generative-AI-enhanced modules, merging instructor-led video, live mentoring, and interactive lab work for a flexible sixteen-week path that adapts to each learner. Participants sharpen OSINT, darknet collection, structured analytic techniques, bias mitigation, and AI-powered reporting while meeting International Association for Intelligence Education standards. Completion grants Certified Threat Intelligence Analyst status. Flexible enrollment, corporate-email validation, and rolling office hours give practitioners global access to study at their pace while receiving direct guidance from Treadstone 71 founder Jeff Bardin. Secure your place and turn raw information into actionable intelligence.
Guidelines that ensure the continuity and recovery of critical data, systems, and processes.
Ensuring operational security when using personae to passively collect on your targets.
Cyber psyops - psychological tactics, techniques in the digital realm to influence or manipulate
Learn how Russians examine adversaries in cyber HUMINT analysis
Cognitive and Information Warfare tactics, techniques, and methods from the Russian Perspective
Cognitive and Information Warfare Methods with a focus on their idea of Information Alibi
A historical overview of Russian advanced persistent threat groups, their capabilities, timeline
A strategic review of Russian STEMPLES Plus their ability to execute offensive cyber operations
Learn how to assess your adversary strategically with STEMPLES Plus
Expanded attack surfaces leads to extend cyber attacks
How best to understand your leadership and their knowledge of cyber intelligence.
The core of your analysis is based on your evidence.
What is it? How to recognize traits? Maladaptive modes and manipulation