Treadstone71 Logo
  • Courses

© 2025 Treadstone 71 Cyber Intelligence - CounterIntelligence - Strategic Intelligence - Cognitive Warfare
Built with Teachable
  • EULA for Online Platform - Enrollment equals consent
  • In person Course EULA
  • Terms of Use
  • Privacy Policy

Browse products

Browse products

Product filters:
search

Categories

Treadstone 71 Cyber Intelligence - CounterIntelligence - Strategic Intelligence - Cognitive Warfare logo
  • Browse products
  • In-Person Training
  • Featured Courses
  • Subscription - All Courses
  • Treadstone 71 Services
  • Sign up
  • Log in
Treadstone 71 Cyber Intelligence - CounterIntelligence - Strategic Intelligence - Cognitive Warfare logo

Main menu

Includes navigation links and user settings

Join the Profession of Intelligence Pros

Join the Profession of Intelligence Pros

Product image for  On Demand Strategic Intelligence Analysis

On Demand Strategic Intelligence Analysis

Strategic Intelligence Analysis - Estimative and Warning Intelligence - 10 Weeks - Intense and Rewarding

Course•By Jeff Bardin

Learn more
Product image for Adversary Targeting

Adversary Targeting

Create models on your adversary - their capabilities, intent, and motivations.

Course•By Jeff Bardin

Learn more
Product image for Building a Cyber Intelligence Program - Part 1

Building a Cyber Intelligence Program - Part 1

This is the part 1 instruction lays out the roadmap for a mature cyber intelligence program

Course•By Treadstone 71

Learn more
Product image for Building a Cyber Intelligence Program - Part 4

Building a Cyber Intelligence Program - Part 4

An in depth look at the different types of analysis and how they work in intelligence analysis.

Course•By Treadstone 71

Learn more
Product image for Building a Cyber Intelligence Program - Parts 2 & 3

Building a Cyber Intelligence Program - Parts 2 & 3

This section covers the functions and capabilities for an essentional cyber intelligence program.

Course•By Treadstone 71

Learn more
Product image for Building and Enhancing Your CTI Program with Strategic Intelligence Analysis - The Formula!

Building and Enhancing Your CTI Program with Strategic Intelligence Analysis - The Formula!

Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time

Course•By Treadstone 71

Learn more
Product image for Certified Cyber CounterIntelligence Analyst - In Person Course

Certified Cyber CounterIntelligence Analyst - In Person Course

Course•By Treadstone 71

Learn more
Product image for Certified Cyber Intelligence Analyst - In Person Course

Certified Cyber Intelligence Analyst - In Person Course

Course•By Treadstone 71

Learn more
Product image for Chinese Cognitive and Information Warfare Section 1  - Cyber Psyops - APT Groups

Chinese Cognitive and Information Warfare Section 1 - Cyber Psyops - APT Groups

Cognitive and Information Warfare tactics, techniques, and methods from the Chinese Perspective

Course•By Treadstone 71

Learn more
Product image for Cialdini's Principles

Cialdini's Principles

Cyber Cognitive Warfighter

Course•By Treadstone 71

Learn more
Product image for Cognitive Warfare Definitions Part 1

Cognitive Warfare Definitions Part 1

Cognitive Warfare Some definitions and concepts - Cyber Psyops

Course•By Treadstone 71

Learn more
Product image for Collection Management

Collection Management

Using your knowledge of stakeholders, adversaries, and intelligence requirements, create a collection plan and manage it!

Course•By Jeff Bardin

Learn more
Product image for Color Revolutions - Cognitive Warfare - Cyber Psyops

Color Revolutions - Cognitive Warfare - Cyber Psyops

What are color revolutions and what role does cyber cognitive warfare play in them.

Course•By Treadstone 71

Learn more
Product image for Conspiracy Theories

Conspiracy Theories

Weaponizing Theories to Divide

Course•By Treadstone 71

Learn more
Product image for Critical Thinking and Cognitive Bias for Cyber Intelligence

Critical Thinking and Cognitive Bias for Cyber Intelligence

The building blocks of intelligence analysis and the pitfalls you may encounter

Course•By Jeff Bardin

Learn more
Product image for Cryptocurrency Certified Cyber CounterIntelligence Analyst - AI-Infused

Cryptocurrency Certified Cyber CounterIntelligence Analyst - AI-Infused

Certified Cyber CounterIntelligence Analyst – Cryptocurrency Investigations arms professionals with practical tradecraft for pursuing threat actors across blockchains. Over eight to twelve weeks, learners progress through on-demand video, interactive labs, and downloadable reference packs while maintaining operational security behind personalized GPT assistants. Syllabus spans persona construction, Dark Triad behavioral profiling, structured analytic techniques, deception planning, and offensive countermeasures, then drills into Russian and Chinese tactics as well as North Korean cryptocurrency raids. Hands-on walkthroughs of Hunchly, blockchain fraud schemes, and influence-operation dirty tricks build investigative muscle memory that endures under pressure. Completion grants Treadstone 71 certification and CPE credit recognized by professional associations.

Course•By Treadstone 71

Learn more
Product image for Cyber CoIntelPro

Cyber CoIntelPro

Applying Cyber to the FBI Counterintelligence Program - Cointelpro - Cyber Psyops

Course•By Treadstone 71

Learn more
Product image for Cyber Warfare

Cyber Warfare

The training explores the evolving landscape of cyber warfare, emphasizing its increasingly complex strategies and challenges.

Course•By Treadstone 71

Learn more
Product image for Cyber and Information Operations Leadership Training - In Person

Cyber and Information Operations Leadership Training - In Person

Course•By Treadstone 71

Learn more
Product image for Cyber in the Supply Chain

Cyber in the Supply Chain

Companies and the DOD have complex supply chains that includes weapons systems and goods.

Course•By Treadstone 71

Learn more
Product image for Deception Planning

Deception Planning

Cyber Cognitive Warfighter - Denial and Deception

Course•By Treadstone 71

Learn more
Product image for Dirty Tricks  - Cyber Psyops

Dirty Tricks - Cyber Psyops

CounterIntelligence and Deception - Dirty Tricks used online

Course•By Treadstone 71

Learn more
Product image for Disinformation - Cognitive Warfare - Misinformation & Influence Operations

Disinformation - Cognitive Warfare - Misinformation & Influence Operations

Information Warfare, Types of Disinformation, and Disinformationists

Course•By Treadstone 71

Learn more
Product image for Free - Cyber Intelligence Course Overview with a Cyber CounterIntel Sneak Preview

Free - Cyber Intelligence Course Overview with a Cyber CounterIntel Sneak Preview

Cyber Intelligence Cert and a sneak preview of Cyber CounterIntel, Cognitive Warfare, and Cyber Intelligence Basics

Course•By Treadstone 71

Learn more
Product image for Generative AI - Certified Cyber CounterIntelligence Analyst

Generative AI - Certified Cyber CounterIntelligence Analyst

Generative AI Certified Cyber CounterIntelligence Analyst packs offensive and defensive tradecraft into an eight-to-twelve-week (on average continuous effort), on-demand sprint that is self-paced.

Course•By Treadstone 71

Learn more
Product image for Intelligence Requirements

Intelligence Requirements

Build your intelligence requirements to effectively address stakeholder needs. Learn the right way, here!

Course•By Jeff Bardin

Learn more
Product image for Iranian Cognitive & Information Warfare Section 1 - Cyber Psyops

Iranian Cognitive & Information Warfare Section 1 - Cyber Psyops

Grey zone activities, cognitive warfare actions, info warfare, cyber psyops, & primary APTs

Course•By Treadstone 71

Learn more
Product image for Iranian Cognitive and Information Warfare Section 2 - Cyber Psyops

Iranian Cognitive and Information Warfare Section 2 - Cyber Psyops

Measuring Iran's Cyber Capability with STEMPLES Plus

Course•By Treadstone 71

Learn more
Product image for Myers-Briggs Personality Typing - Under Pressure and Destructive Modes

Myers-Briggs Personality Typing - Under Pressure and Destructive Modes

Learn the MBTI and how to understand and influence your adversary personas

Course•By Treadstone 71

Learn more
Product image for On Demand - Analytic Writing (Reporting and Briefs)

On Demand - Analytic Writing (Reporting and Briefs)

Learn how to inform quickly with clear, concise, complete, usable, relevant and timely intel

Course•By Treadstone 71

Learn more
Product image for On Demand - Structured and Advanced Structured Analytic Techniques

On Demand - Structured and Advanced Structured Analytic Techniques

Structured analysis is a mechanism by which internal thought processes are externalized systematically and transparently so that they can be shared. We continually enhance existing techniques while adding new options. New - Thirty Advanced SATS

Course•By Jeff Bardin

Learn more
Product image for On Demand Strategic Intelligence Analysis Plus Building and Enhancing Your CTI Program

On Demand Strategic Intelligence Analysis Plus Building and Enhancing Your CTI Program

Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time

Course•By Jeff Bardin

Learn more
Product image for On-Demand - People Intelligence - PEOPINT

On-Demand - People Intelligence - PEOPINT

Discover People Intelligence: The New Cyber Intelligence Training Imagine a cyber intelligence field where understanding people is as important as understanding computers. People Intelligence is a new training that puts the human element at the center of cybersecurity. It trains you to see how human behavior, culture, and choices affect digital security. This training opens the door to a future where you can use technology and empathy together to keep communities safe online. What is People Intelligence? People Intelligence is about the human side of cyber intelligence. In this training, you learn how people's actions and decisions can impact digital safety. Cyber threats often involve tricking or influencing people.

Course•By Treadstone 71

Learn more
Product image for On-Demand - Self Paced - Generative AI - Cyber Intelligence Tradecraft  - Certified Intelligence Analyst -

On-Demand - Self Paced - Generative AI - Cyber Intelligence Tradecraft - Certified Intelligence Analyst -

On Demand - Cyber Intelligence Tradecraft Cyber Intelligence Training Course Newly extended and updated content with Generative AI.

Course•By Treadstone 71

Learn more
Product image for Overview of the Global Resilience Federation, Operational Resiliency Framework and CMM.

Overview of the Global Resilience Federation, Operational Resiliency Framework and CMM.

Guidelines that ensure the continuity and recovery of critical data, systems, and processes.

Course•By Treadstone 71

Learn more
Product image for Personas and OPSEC

Personas and OPSEC

Ensuring operational security when using personae to passively collect on your targets.

Course•By Treadstone 71

Learn more
Product image for Psychological Operations - Cyber Cognitive Warfighter - A NATO View

Psychological Operations - Cyber Cognitive Warfighter - A NATO View

Cyber psyops - psychological tactics, techniques in the digital realm to influence or manipulate

Course•By Treadstone 71

Learn more
Product image for Psychology of the Seven Radicals  - Cyber Psyops

Psychology of the Seven Radicals - Cyber Psyops

Learn how Russians examine adversaries in cyber HUMINT analysis

Course•By Treadstone 71

Learn more
Product image for Russian Cognitive and Information Warfare Section 1  - Cyber Psyops

Russian Cognitive and Information Warfare Section 1 - Cyber Psyops

Cognitive and Information Warfare tactics, techniques, and methods from the Russian Perspective

Course•By Treadstone 71

Learn more
Product image for Russian Cognitive and Information Warfare Section 2 - Information Alibi  - Cyber Psyops

Russian Cognitive and Information Warfare Section 2 - Information Alibi - Cyber Psyops

Cognitive and Information Warfare Methods with a focus on their idea of Information Alibi

Course•By Treadstone 71

Learn more
Product image for Russian Grey Zone activities, APT Groups - Timelines and Capabilities

Russian Grey Zone activities, APT Groups - Timelines and Capabilities

A historical overview of Russian advanced persistent threat groups, their capabilities, timeline

Course•By Treadstone 71

Learn more
Product image for Russian STEMPLES Plus, Hofstede Principles, and Indicators of Change

Russian STEMPLES Plus, Hofstede Principles, and Indicators of Change

A strategic review of Russian STEMPLES Plus their ability to execute offensive cyber operations

Course•By Treadstone 71

Learn more
Product image for STEMPLES Plus - Indicators of Change - Hofstede Principles

STEMPLES Plus - Indicators of Change - Hofstede Principles

Learn how to assess your adversary strategically with STEMPLES Plus

Course•By Treadstone 71

Learn more
Product image for Satellite Cybersecurity

Satellite Cybersecurity

Expanded attack surfaces leads to extend cyber attacks

Course•By Treadstone 71

Learn more
Product image for Stakeholder Analysis

Stakeholder Analysis

How best to understand your leadership and their knowledge of cyber intelligence.

Course•By Jeff Bardin

Learn more
Product image for Strategic Source Evaluation - Credibility, Validity, Relevance, and Types of Evidence

Strategic Source Evaluation - Credibility, Validity, Relevance, and Types of Evidence

The core of your analysis is based on your evidence.

Course•By Jeff Bardin

Learn more
Product image for The Big 5 in Cyber Intelligence

The Big 5 in Cyber Intelligence

What is it? How to recognize traits? Maladaptive modes and manipulation

Course•By Treadstone 71

Learn more
Product image for The Dark Triad and Pitch-Black Tetrad

The Dark Triad and Pitch-Black Tetrad

The Dark Triad is made up of three traits: Machiavellianism, Narcissism and Psychopathy. They are considered to be fairly prevalent in the world of work. Researchers have linked these behavioral traits with the process of acquiring of leadership. The dark triad has been found to be particularly highly represented in more senior roles, including the C-suite. In fact, some researchers have put the proportion of CEOs with clinically significant levels of psychopathic traits as high as 20%.. We see the dark triad as incomplete and have added schadenfreude as the fourth area of measurement, representing the Pitch-Black Tetrad.

Course•By Treadstone 71

Learn more
Product image for Transnational Cyber Intelligence-Driven Cybercrime and Crimeware Analyst

Transnational Cyber Intelligence-Driven Cybercrime and Crimeware Analyst

Cybercriminal networks don’t stop at borders. Neither should your training. This advanced intelligence course immerses you in real-world, scenario-driven simulations against global cybercrime actors. Combining structured analytic techniques with Europol’s training competency frameworks, this course prepares you to disrupt the most resilient, AI-augmented, and financially integrated cybercriminal ecosystems. Scenario‑driven labs simulate live ransomware outbreaks, giving you a chance to hone response protocols and refine threat hunting playbooks under pressure. Every lesson reinforces best practices developed by EC3 and Eurojust, ensuring your findings support cross‑border prosecutions. Whether investigating ransomware-as-a-service groups, infiltrating darknet drug networks, or analyzing cross-border financial laundering, this program equips you to think like the adversary—and then stop them.

Course•By Treadstone 71

Learn more
49 products found