NICCS LISTED · COLLECTION MANAGEMENT · F3EAD · COLLECTION PLANNING · GAP ANALYSIS · IAFIE ALIGNED

Collection Management Disciplined Collection Planning, Tasking, and Gap Analysis for Cyber Intelligence

Collection management is the discipline that turns intelligence requirements into operational collection that actually answers them. It identifies what information is needed, what sources can answer it, what gaps remain after available collection, how to prioritize when collection capacity is constrained, and how to validate that collected information satisfies the underlying requirement. Without disciplined collection management, intelligence work drifts toward whatever is easy to collect rather than what is needed — the predictable failure mode in cyber intelligence functions that have invested heavily in tooling without investing in tradecraft.

This course covers collection management applied to cyber intelligence operations — collection planning aligned to intelligence requirements, source-discipline allocation (OSINT, HUMINT, SIGINT, TECHINT, ALL-SOURCE), F3EAD-style operational loops, collection gap analysis, prioritization under constrained capacity, and the tradecraft that connects upstream requirements to downstream analytic production. Critical for cyber intelligence analysts and program leads building working collection discipline.

Course Price$399 USD
DisciplineOperational
LevelIntermediate
LoopF3EAD

What You'll Learn

Collection management tradecraft for cyber intelligence operations

  • Collection Planning Discipline — translating Intelligence Requirements (PIRs, EEIs, SIRs) into structured collection plans. What sources can answer which requirements, what tasking is needed, what timing constraints apply, and what dependencies exist among collection activities.
  • Source-Discipline Allocation — matching collection tasks to source disciplines: OSINT for breadth, HUMINT for context, SIGINT and TECHINT for technical signal, ALL-SOURCE for integrated analytic production. The judgment calls that determine which source discipline gets tasked against which requirement.
  • F3EAD Operational Loop — Find, Fix, Finish, Exploit, Analyze, Disseminate as the operational cycle that integrates collection with analysis and action. Why F3EAD adapts naturally to cyber intelligence work and how the loop closes (or fails to close) in CTI environments.
  • Collection Gap Analysis — structured identification of what cannot be answered by available collection. The discipline that turns "we don't know" into either "we need to expand collection in X direction" or "this requirement cannot be answered and consumers need to know that."
  • Prioritization Under Constraint — collection capacity is finite. The discipline of allocating constrained collection across competing requirements based on stakeholder weights, decision timing, source availability, and operational feasibility.
  • Collection-Analysis Integration — operational handoffs between collection and analysis. The patterns that prevent collected information from sitting unprocessed and prevent analytic gaps from staying invisible to collection planning.

Course Content

Connecting Requirements to Operational Collection

Collection management sits at the operational center of the intelligence cycle. Upstream of collection management, Stakeholder Analysis identifies consumer decisions and Intelligence Requirements structures those decisions into formal PIRs, EEIs, and SIRs. Downstream, collected information feeds the analytic-method band (SATs, Critical Thinking, Analytic Writing). Collection management is the operational hinge — it determines whether the analytic chain receives information aligned to consumer decisions or whatever was easy to gather. In well-functioning intelligence programs, collection management is among the highest-leverage disciplines; in struggling programs, it is typically the largest available improvement opportunity.

This course operationalizes the IC collection-management tradition for cyber intelligence specifically — collection planning aligned to PIRs / EEIs / SIRs, source-discipline allocation across the cyber-relevant collection landscape, F3EAD adapted for CTI environments, gap analysis that surfaces collection limitations to stakeholders before they cause analytic failures, and prioritization tradecraft for the constrained-capacity reality of working cyber intelligence functions. The course is operationally interconnected with the other Collection-band components in The Analyst Stack: Stakeholder Analysis (upstream), Intelligence Requirements (parallel structuring), and Source Evaluation (downstream validation).

Part Of A Larger Curriculum

Operational Center of the Collection Band in The Analyst Stack

This Collection Management course is the operational center of the collection-discipline band in The Analyst Stack ($6,999), alongside Stakeholder Analysis ($399), Intelligence Requirements ($299), and Source Evaluation ($399). The four components form the upstream collection-discipline foundation that the analytic-method band (SATs, Critical Thinking, Analytic Writing) and the strategic-assessment band (STEMPLES Plus) build on. Together with the CCIA flagship: comprehensive analyst capability.

Common Questions

Collection Management — FAQ

Who is this course designed for?

Cyber threat intelligence analysts working collection planning and execution, CTI program leads and managers building or refining intelligence functions, security operations leaders integrating CTI collection with internal collection (SIEM, EDR, telemetry), IC analysts entering or transitioning into cyber portfolios, MSSP / consulting analysts managing multi-source collection across clients, and analytic methodology trainees building the operational collection discipline.

How does this differ from generic CTI tooling training?

Generic CTI tooling training teaches the operation of specific platforms. Collection management is the discipline that determines what to collect and why — independent of tooling. The course covers the tradecraft that makes tooling investments produce intelligence outcomes rather than data volume. Many cyber intelligence functions have invested heavily in tooling without investing in collection management tradecraft; this course addresses that gap.

Is F3EAD an IC tradition or a cyber-specific framework?

F3EAD (Find, Fix, Finish, Exploit, Analyze, Disseminate) emerged from IC and special-operations tradecraft and adapts naturally to cyber intelligence work. The course covers F3EAD as one operational loop among several, with cyber-domain calibration of each step. F3EAD is widely referenced in CTI literature but often without operational rigor; the course operationalizes the loop rather than just naming it.

Is there a prerequisite?

None formal. Most learners benefit from the full collection-discipline band: Stakeholder Analysis ($399), Intelligence Requirements ($299), and Source Evaluation ($399). The four components are operationally interconnected.

Is this part of a bundle or certification?

Yes. This course is one of 10 components of The Analyst Stack ($6,999) — the operational center of the collection-discipline band. Contributes to the CCIA (Certified Cyber Intelligence Analyst) certification track.

About The Provider
Treadstone 71
We See What Others Cannot

Treadstone 71 has built cyber intelligence collection programs for two decades — collection planning aligned to stakeholder requirements, multi-source discipline across OSINT, HUMINT, SIGINT, TECHINT, and ALL-SOURCE work, F3EAD operational loops adapted for CTI environments, and gap analysis disciplined to surface collection limitations before they cause analytic failures. The course reflects operational experience across financial services, defense industrial base, federal civilian agencies, MSSP and consulting practices, and critical infrastructure operators. Veteran-owned, woman-led, NICCS-listed, IAFIE-aligned, operational since 2002.

Two Decades Collection Program Build
Multi-Source Discipline Across Sectors
NATO CCDCOE Briefings
NICCS Listed Provider

Connect Requirements to Operational Collection. Close the Loop.

Self-paced. Intermediate-level. Collection management tradecraft for cyber intelligence operations. F3EAD operational loop, source-discipline allocation, gap analysis. Scroll up to enroll, or consider The Analyst Stack to combine this with the full collection-discipline band and the broader analyst methodology curriculum.

$399 USD Self-paced · Intermediate · Lifetime access · CPE credits

Get started now!



Course Curriculum