Strategic Intelligence Analysis - Estimative and Warning Intelligence - 10 Weeks - Intense and Rewarding
Create models on your adversary - their capabilities, intent, and motivations.
Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time
Cyber Cognitive Warfighter
Using your knowledge of stakeholders, adversaries, and intelligence requirements, create a collection plan and manage it!
What are color revolutions and what role does cyber cognitive warfare play in them.
The building blocks of intelligence analysis and the pitfalls you may encounter
Cryptocurrency Certified Cyber CounterIntelligence Analyst - AI-Infused. Counter Disinformation, Misinformation while building Cyber CounterIntelligence Plans to Subvert the Adversary
Applying Cyber to the FBI Counterintelligence Program - Cointelpro - Cyber Psyops
CounterIntelligence and Deception - Dirty Tricks used online
Generative AI - Cyber CounterIntelligence Tradecraft - Counter Disinformation, Misinformation while building Cyber CounterIntelligence Plans to Subvert the Adversary
Build your intelligence requirements to effectively address stakeholder needs. Learn the right way, here!
Grey zone activities, cognitive warfare actions, info warfare, cyber psyops, & primary APTs
Measuring Iran's Cyber Capability with STEMPLES Plus
Learn the MBTI and how to understand and influence your adversary personas
Learn how to inform quickly with clear, concise, complete, usable, relevant and timely intel
Structured analysis is a mechanism by which internal thought processes are externalized systematically and transparently so that they can be shared. We continually enhance existing techniques while adding new options.
Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time
Cyber psyops - psychological tactics, techniques in the digital realm to influence or manipulate
A historical overview of Russian advanced persistent threat groups, their capabilities, timeline
Learn how to assess your adversary strategically with STEMPLES Plus
How best to understand your leadership and their knowledge of cyber intelligence.
The core of your analysis is based on your evidence.