Building and Enhancing Your CTI Program

Strategic Intelligence Analysis Certification

Move your organization to cyber intelligence program maturity through intensive, on-demand training spanning 12 weeks of rigorous tradecraft execution.

Enroll Now ($4,999)

How does Treadstone 71 train analysts to build a mature Cyber Threat Intelligence (CTI) program?

Treadstone 71 delivers a 12-week, intensive certification that bridges traditional tradecraft with AI-infused analysis. We train professionals to coordinate collection requirements, execute estimative forecasting, and use 30 advanced Structured Analytic Techniques (SATs) to transform raw data into actionable, decision-maker-ready intelligence based on federal standards.

Intelligence is our only business. Since 2002, we have operated as a pure-play intelligence shop. We do not follow the "create once and deliver many" model. We supply intelligence training based on clearly defined requirements, using intuition, structured techniques, and decades of experience to accurately monitor and report changes in adversary threat dispositions and tactics.

What operational methodologies and technical frameworks are integrated into the curriculum?

The curriculum abandons theoretical sandboxes for live-environment, passive collection. Analysts master data provenance using Hunchly, OPSEC rules, and persona development while mapping threats to the MITRE ATT&CK and Diamond Models. We emphasize rigorous evaluation of source credibility to reduce cognitive bias and deception.

Estimative Forecasting

Anticipate key target or threat activities that are likely to prompt a leadership decision before an incident occurs.

Deception Mitigation

Develop analytic methods to recognize and reduce deception in reporting when information is incomplete or no precedent exists.

Adversary Targeting

Assess intelligence and target vulnerabilities to determine courses of action, assisting in priority information requirement (PIR) development.

How does the certification align with Intelligence Community directives?

Our training pedagogy is strictly aligned with the Office of the Director of National Intelligence (ODNI). We enforce ICD 203 (Analytic Standards) and ICD 206 (Sourcing Requirements) to ensure objective, independent analysis. Graduates produce timely, fused, all-source intelligence products designed to anticipate threat activities and inform executive action.

To validate our operational playbooks, our methods map directly to the ODNI Analytic Standards (ICD 203) and are cataloged within the federal CISA NICCS Training Directory.

12-Week Intensive Curriculum Breakdown

The program requires dedication. You will learn to build a cyber intelligence program while concurrently developing the strategic analysis skills required to run it.

Phase Key Learning Modules & Deliverables
Weeks 1 - 3 Data Provenance (Hunchly), OPSEC Rules, Persona Development, Adaptive Intelligence Lifecycle, Building your GPT, Source Evaluation, MITRE ATT&CK, Kill Chain, and the Diamond Model.
Weeks 3 - 5 Strategic Intelligence Analysis Foundations, Stakeholder Analysis & Tracking, Intelligence Requirements, Adversary Targeting, and Critical Thinking/Cognitive Bias Mitigation.
Weeks 6 - 7 Introduction to Analysis of Competing Hypotheses (ACH), Open Source Tools, Targeted Toolsets, and Intensive Analytic Writing (Parts 1 & 2).
Weeks 8 - 10 Treadstone 71's 30 Advanced Structured Analytic Techniques (SATs) with AI, Strategic Foresight, STEMPLES Plus, Indicators of Change, and Hofstede Principles.
Weeks 11 - 12 Strategic Reporting and Briefs, Analyst Activities (Cognitive Elements), Threat Hunting, and Building a Cyber Intelligence Program (Vision, Mission, CTI Organizational Structure, Maturity Models, SOPs, and TIP Selection).

NICE Workforce Framework Alignment

NICE Framework Category Specific Work Roles
Analyze Threat Analysis
Analyze All-Source Analysis
Protect and Defend Cyber Defense Analysis

Frequently Asked Questions

When does the course start and finish? It is a completely self-paced online course. You decide when you start, and you have unlimited access for 12 months (expandable upon request).
Is the course heavy on technical requirements? No. If you can use a browser, start and stop a VPN, install desktop software, and use MS Office, all you need is curiosity and focus.
Are there assignments due every week? No. We know everyone has a life and work requirements. We adjust for you as needed to maintain continuity.

Secure Your Seat

Enroll in the Strategic Intelligence Analysis & CTI Program Build certification. Pay in full or via installments.

Enroll via Teachable Checkout

Your Instructor


Treadstone 71
Treadstone 71

Treadstone 71 is a woman and veteran-owned small business exclusively focused on cyber and threat intelligence consulting, services, and training. We are a pure-play intelligence shop.

Training dates and locations here

Since 2002, Treadstone 71 delivers intelligence training, strategic, operational, and tactical intelligence consulting, and research. We provide a seamless extension of your organization efficiently and effectively moving your organization to cyber intelligence program maturity. Our training, established in 2008, follows intelligence community standards as applied to the ever-changing threat environment delivering forecasts and estimates as intelligence intends. From baseline research to adversary targeted advisories and dossiers, Treadstone 71 products align with your intelligence requirements. We do not follow the create once and deliver many model. We contextually tie our products to your needs. Intelligence is our only business.

  • We use intuition, structured techniques, and years of experience.
  • We supply intelligence based on clearly defined requirements.
  • We do not assign five people to do a job only one with experience.
  • We do not bid base bones only to change order you to overspending.
We do not promise what we cannot deliver. We have walked in your shoes. We understand your pressures.

We are known for our ability to:

  • Anticipate key target or threat activities that are likely to prompt a leadership decision.
  • Aid in coordinating, validating, and managing collection requirements, plans, and activities.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives as related to designated cyber operations warning problem sets.
  • Produce timely, fused, all-source cyber operations intelligence and indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
  • Provide intelligence analysis and support to designated exercises, planning activities, and time-sensitive operations.
  • Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or no precedent exists.
  • Recognize and mitigate deception in reporting and analysis.
    Assess intelligence, recommend targets to support operational objectives.
  • Assess target vulnerabilities and capabilities to determine a course of action.
  • Assist in the development of priority information requirements.
  • Enable synchronization of intelligence support plans across the supply chain.
  • ...and Review and understand organizational leadership objectives and planning guidance non-inclusively.

Course Curriculum


  Speed Reading and Collection Management - Source Evaluation - Evidence
Available in days
days after you enroll
  Technical Security - Threat Intelligence
Available in days
days after you enroll
  Blue - Red - Purple
Available in days
days after you enroll
  Start Building and Enhancing Your Program - Stakeholder Analysis
Available in days
days after you enroll
  Building and Enhancing Your Program - Collection Management
Available in days
days after you enroll
  Building and Enhancing Your Program - STEMPLES Plus - Indicators of Change - Hofstede Principles
Available in days
days after you enroll
  Strategic Intelligence Analysis Week 10
Available in days
days after you enroll
  Building a Cyber Intelligence Program - Parts 2 & 3
Available in days
days after you enroll
  Argument Mapping and Threat Hunting
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
It is a completely self-paced online course - you decide when you start and hopefully, it is within 12 months. We can extend.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for 12 months.

Get started now!