Cryptocurrency Certified Cyber CounterIntelligence Analyst - AI-Infused

Cryptocurrency Certified Cyber CounterIntelligence Analyst - AI-Infused —
Waitlist

Certified Cyber CounterIntelligence Analyst — Cryptocurrency Investigations

Explore strategies and insights with a complete program for professionals who investigate cryptocurrency, counter adversary deception, and strengthen counterintelligence. Produce real artifacts, apply proven frameworks, and move from concepts to confident execution.

Start Now Preview Syllabus

Course Overview

Learn practical tools and techniques that help you tackle emerging threats across cyber counterintelligence, cryptocurrency investigations, and deception planning. Follow a structured path that moves from foundations and OPSEC to threat actor analysis, behavioral models, SATs, and analytic writing.

8–12 Weeks · On-Demand · Online · Self-Paced

What You Will Learn

New Section — Elicitation in Interviews and Online
Apply structured elicitation in live and online settings to extract reliable information while maintaining sound OPSEC and ethical boundaries.
Section I — Foundations of Cyber Counterintelligence
Work with open-source intelligence tools with an emphasis on Hunchly and case-driven workflows.
Apply OPSEC principles and create a safe, task-specific GPT that supports investigations without exposing tradecraft.
Section II — Awareness of Blockchain and Cryptocurrency Fraud
Adopt OPSEC tailored for blockchain tracing and on-chain pivots.
Recognize fraud schemes and actor tactics common to cryptocurrency ecosystems.
Section IIA — Persona Development and Character Archetypes
Design and assess personas that reveal adversary behavior and improve analytic accuracy.
Section III — Psychological Insights and Behavioral Analysis
Apply Cialdini’s principles of influence to investigative engagements.
Use Dark Triad and Pitch Black Tetrad constructs to frame hostile operator profiles.
Examine MBTI under pressure in cryptocurrency contexts and understand failure modes.
Section IV — Threat Actor Analysis
Study tactics and motivations of cryptocurrency threat actors with a focus on North Korea and other state sponsors.
Section V — Tactics and Deception in Influence Operations
Analyze dirty tricks, disinformation methods, and frameworks from “Rules for Radicals.”
Counter manipulation with clear, repeatable countermeasures.
Section VI — Deception Planning and Execution
Plan sophisticated deception tailored to cryptocurrency investigations and counterintelligence missions.
Section VII — Offensive Countermeasures
Apply offensive strategies and ADHD frameworks for proactive engagement and disruption.
Section VIII — Structured Analytic Techniques for Cryptocurrency
Run SATs such as ACH to structure blockchain analysis and reduce bias.
Section IX — Cryptocurrency in Russia
Track unique operational patterns in Russia’s cryptocurrency space and adjust tradecraft to frequent shifts.
Section X — Chinese Threat TTPs
Investigate Chinese counterintelligence and deception methods and translate findings into concrete defenses.
Section XI — Analytic Writing for Investigations
Write structured, persuasive intelligence reports tuned for stakeholders and enforcement partners.

Downloadable Resources

Access a library of templates, checklists, report styles, and worksheets that support real investigative work.

Course Features

Hours of focused video content on current counterintelligence and cryptocurrency investigations.
Interactive lessons that drive hands-on skill development and clear outcomes.
Coverage of emerging threats, psychological operations, and geopolitical nuance.

Outcomes

Capability After Completion
OPSEC & Tradecraft Confident execution across web, on-chain, and communication channels.
Actor & Deception Analysis Clear profiles, tested hypotheses, and counter-deception playbooks.
Investigative Outputs Report packages with evidence, confidence levels, and action paths.

Learner Feedback

“On-chain analysis moved from guesswork to disciplined. Reports now drive enforcement action.”

— Investigator, Financial Crimes Unit

“Deception planning and SATs changed how our team frames hypotheses and tests claims.”

— CTI Lead, Global Exchange

Instructor

Lead Instructor
Forty years of intelligence experience are built into this online recorded course with the availability for instructor office hours or email/text Q&A
Join the Waitlist
Flexible Pricing

Gain access to videos, templates, examples, and support. Progress at your pace and build a complete investigation toolkit.

Your Instructor


Treadstone 71
Treadstone 71

Treadstone 71 is a woman and veteran-owned small business exclusively focused on cyber and threat intelligence consulting, services, and training. We are a pure-play intelligence shop.

Training dates and locations here

Since 2002, Treadstone 71 delivers intelligence training, strategic, operational, and tactical intelligence consulting, and research. We provide a seamless extension of your organization efficiently and effectively moving your organization to cyber intelligence program maturity. Our training, established in 2008, follows intelligence community standards as applied to the ever-changing threat environment delivering forecasts and estimates as intelligence intends. From baseline research to adversary targeted advisories and dossiers, Treadstone 71 products align with your intelligence requirements. We do not follow the create once and deliver many model. We contextually tie our products to your needs. Intelligence is our only business.

  • We use intuition, structured techniques, and years of experience.
  • We supply intelligence based on clearly defined requirements.
  • We do not assign five people to do a job only one with experience.
  • We do not bid base bones only to change order you to overspending.
We do not promise what we cannot deliver. We have walked in your shoes. We understand your pressures.

We are known for our ability to:

  • Anticipate key target or threat activities that are likely to prompt a leadership decision.
  • Aid in coordinating, validating, and managing collection requirements, plans, and activities.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives as related to designated cyber operations warning problem sets.
  • Produce timely, fused, all-source cyber operations intelligence and indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
  • Provide intelligence analysis and support to designated exercises, planning activities, and time-sensitive operations.
  • Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or no precedent exists.
  • Recognize and mitigate deception in reporting and analysis.
    Assess intelligence, recommend targets to support operational objectives.
  • Assess target vulnerabilities and capabilities to determine a course of action.
  • Assist in the development of priority information requirements.
  • Enable synchronization of intelligence support plans across the supply chain.
  • ...and Review and understand organizational leadership objectives and planning guidance non-inclusively.

Course Curriculum


  Section II - Intro and Awareness
Available in days
days after you enroll
  Section IIA - Personas - Character Archetypes
Available in days
days after you enroll
  Section III - Cialdini - Trolls Plus - MBTI Destructive
Available in days
days after you enroll
  Section IV - Cryptocurrency Threat Actors - NK
Available in days
days after you enroll
  Section V - Dirty Tricks - Rules - Disinformationist
Available in days
days after you enroll
  Section VI - Deception Planning and Methods
Available in days
days after you enroll
  Section VII - Offensive Countermeasures - Crypto Focused
Available in days
days after you enroll
  Section VIII - SATS for Cryptocurrency
Available in days
days after you enroll
  Section IX - Cryptocurrency in Russia
Available in days
days after you enroll
  Section X - Chinese TTPs and Methods
Available in days
days after you enroll
  Section XI - Analytic Writing for Cryptocurrency Investigations
Available in days
days after you enroll
  Downloadable Content
Available in days
days after you enroll

 Name:


 Email:


 Message - I agree to the EULA


Get started now!