Strategic Intelligence Analysis - Estimative and Warning Intelligence - 10 Weeks - Intense and Rewarding
CourseBy Jeff Bardin
From adversary cyber warfare methods to building your intel program
Bundle
Create models on your adversary - their capabilities, intent, and motivations.
CourseBy Jeff Bardin
This is the part 1 instruction lays out the roadmap for a mature cyber intelligence program
CourseBy Treadstone 71
An in depth look at the different types of analysis and how they work in intelligence analysis.
CourseBy Treadstone 71
This section covers the functions and capabilities for an essentional cyber intelligence program.
CourseBy Treadstone 71
Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time
CourseBy Treadstone 71
CourseBy Treadstone 71
CourseBy Treadstone 71
Cognitive and Information Warfare tactics, techniques, and methods from the Chinese Perspective
CourseBy Treadstone 71
Cyber Cognitive Warfighter
CourseBy Treadstone 71
Cognitive Warfare Some definitions and concepts - Cyber Psyops
CourseBy Treadstone 71
Using your knowledge of stakeholders, adversaries, and intelligence requirements, create a collection plan and manage it!
CourseBy Jeff Bardin
What are color revolutions and what role does cyber cognitive warfare play in them.
CourseBy Treadstone 71
Weaponizing Theories to Divide
CourseBy Treadstone 71
CoachingBy Jeff Bardin
The building blocks of intelligence analysis and the pitfalls you may encounter
CourseBy Jeff Bardin
Certified Cyber CounterIntelligence Analyst – Cryptocurrency Investigations arms professionals with practical tradecraft for pursuing threat actors across blockchains. Over eight to twelve weeks, learners progress through on-demand video, interactive labs, and downloadable reference packs while maintaining operational security behind personalized GPT assistants. Syllabus spans persona construction, Dark Triad behavioral profiling, structured analytic techniques, deception planning, and offensive countermeasures, then drills into Russian and Chinese tactics as well as North Korean cryptocurrency raids. Hands-on walkthroughs of Hunchly, blockchain fraud schemes, and influence-operation dirty tricks build investigative muscle memory that endures under pressure. Completion grants Treadstone 71 certification and CPE credit recognized by professional associations.
CourseBy Treadstone 71
Applying Cyber to the FBI Counterintelligence Program - Cointelpro - Cyber Psyops
CourseBy Treadstone 71
CourseBy Treadstone 71
Normally well over $5k! Signup now!
Bundle
Cyber Intelligence + Counterintelligence Bundle Certified Cyber Intelligence Analyst + Certified Cyber Counterintelligence Analyst (On-Demand) Get Two Flagship Courses. One Bundle. Full-Spectrum Intelligence Tradecraft.
Bundle
Cyber Intelligence Tradecraft, Certified Cyber Intelligence Analyst, Strategic Intelligence Analysis
Bundle
The training explores the evolving landscape of cyber warfare, emphasizing its increasingly complex strategies and challenges.
CourseBy Treadstone 71
CourseBy Treadstone 71
Companies and the DOD have complex supply chains that includes weapons systems and goods.
CourseBy Treadstone 71
Cyber Cognitive Warfighter - Denial and Deception
CourseBy Treadstone 71
CounterIntelligence and Deception - Dirty Tricks used online
CourseBy Treadstone 71
Information Warfare, Types of Disinformation, and Disinformationists
CourseBy Treadstone 71
Cyber Intelligence Cert and a sneak preview of Cyber CounterIntel, Cognitive Warfare, and Cyber Intelligence Basics
CourseBy Treadstone 71
Understanding TaHiTI and using MaGMa
CourseBy Jeff Bardin
Generative AI Certified Cyber CounterIntelligence Analyst packs offensive and defensive tradecraft into an eight-to-twelve-week (on average continuous effort), on-demand sprint that is self-paced.
CourseBy Treadstone 71
The course is a modern shield forged and built to expose deception and validate identity with brutal clarity. It strips away assumptions, presses for truth, and treats every interview like a counterintelligence operation. Interviewers learn to test claims under pressure, probe for inconsistencies, and force impostors off-script.
CourseBy Treadstone 71
Build your intelligence requirements to effectively address stakeholder needs. Learn the right way, here!
CourseBy Jeff Bardin
Grey zone activities, cognitive warfare actions, info warfare, cyber psyops, & primary APTs
CourseBy Treadstone 71
Measuring Iran's Cyber Capability with STEMPLES Plus
CourseBy Treadstone 71
Learn the MBTI and how to understand and influence your adversary personas
CourseBy Treadstone 71
Learn how to inform quickly with clear, concise, complete, usable, relevant and timely intel
CourseBy Treadstone 71
Structured analysis is a mechanism by which internal thought processes are externalized systematically and transparently so that they can be shared. We continually enhance existing techniques while adding new options. New - Thirty Advanced SATS
CourseBy Jeff Bardin
Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time
CourseBy Jeff Bardin
Discover People Intelligence: The New Cyber Intelligence Training Imagine a cyber intelligence field where understanding people is as important as understanding computers. People Intelligence is a new training that puts the human element at the center of cybersecurity. It trains you to see how human behavior, culture, and choices affect digital security. This training opens the door to a future where you can use technology and empathy together to keep communities safe online. What is People Intelligence? People Intelligence is about the human side of cyber intelligence. In this training, you learn how people's actions and decisions can impact digital safety. Cyber threats often involve tricking or influencing people.
CourseBy Treadstone 71
On Demand - Cyber Intelligence Tradecraft Cyber Intelligence Training Course Newly extended and updated content with Generative AI.
CourseBy Treadstone 71
Guidelines that ensure the continuity and recovery of critical data, systems, and processes.
CourseBy Treadstone 71
Ensuring operational security when using personae to passively collect on your targets.
CourseBy Treadstone 71
Cyber psyops - psychological tactics, techniques in the digital realm to influence or manipulate
CourseBy Treadstone 71
Learn how Russians examine adversaries in cyber HUMINT analysis
CourseBy Treadstone 71
Cognitive and Information Warfare tactics, techniques, and methods from the Russian Perspective
CourseBy Treadstone 71
Cognitive and Information Warfare Methods with a focus on their idea of Information Alibi
CourseBy Treadstone 71
A historical overview of Russian advanced persistent threat groups, their capabilities, timeline
CourseBy Treadstone 71
A strategic review of Russian STEMPLES Plus their ability to execute offensive cyber operations
CourseBy Treadstone 71
Learn how to assess your adversary strategically with STEMPLES Plus
CourseBy Treadstone 71
Expanded attack surfaces leads to extend cyber attacks
CourseBy Treadstone 71
How best to understand your leadership and their knowledge of cyber intelligence.
CourseBy Jeff Bardin
The core of your analysis is based on your evidence.
CourseBy Jeff Bardin