This is an on-demand course.
The online courses are instructor video and audio recorded with periodic direct interaction with the instructor via online web meetings. The instructor will have standard office time for question and answer as well as regular access via class email and other messaging options.
Validated and registered students will receive login and preparation information 1 week prior to class start. Prospective students must send an email to [email protected] from a corporate account to validate course eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors.
This course follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training (IAFIE) and the Professional Head of Intelligence Analysis Framework (PHIA):
- Introduction to Intelligence
- Critical Thinking
- Analytic Writing
- Creative Thinking
- Analytic Briefing
- Structured Analytic Techniques.
- Analytic Issues
- Argument Mapping
- Case Studies
Latest student testimonial:
"With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real world scenarios establishing a solid understanding on utilizing these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional."
The course includes:
- Anonymity and Passive Persona setup
- Glossary and Taxonomy
- Operational Security - OPSEC
- What Intelligence Can and Cannot Do
- Open-Source Intelligence Techniques and Tools - Maltego
- Stakeholder Analysis
- Collection Methods and Techniques
- Collection Planning, IRs/PIRs/EEIs/Indicators/SIRs
- Collection Process Flow
- Collection (OSINT) Tools and Targeting
- Most likely Threat Actors
- Use of Maltego – overview
- Social Media - Off the beaten path review of social media platforms not in the mainstream
- Intelligence Lifecycle Production Methods
- Structured Analytic Techniques – Their use - Case Study
- Adversary Denial and Deception
- Source Credibility and Relevance - The real NATO Admiralty Scoring
- Source Validation
- Denial and Deception
- Confidence Levels
- Types of evidence
- Production Management
- Critical and Creative Thinking
- Cognitive Bias
- Use of Mitre ATT&CK in Analysis
- ATT&CK in examining patterns and trends
- ATT&CK in Adversary tendencies
- Estimation and Forecasting
- Campaign analysis
- Types and Methods of Analysis
- Synthesis and Fusion
- Analysis of Competing Hypothesis
- Inductive, Abductive, Deductive Reasoning
- Problems with Analysis
- Analytic Writing, BLUF, AIMS, Rules for Effective Writing
- Forecasting in your writing
- Argument Mapping
- Types of Reports
- Product Line Mapping
- Report Serialization, and Dissemination
- Threat Hunting with TaHiTI & MaGMa
- Live Case Studies – Class briefs
All Case Studies use all methods, techniques, and tools referenced in the course material. The Case Studies used are straight from the headlines giving students real world experience during the class.
All students receive 2 books (Amazon Kindle), numerous templates and artifacts, and other course material.
Students who complete the course will be certified as Cyber Intelligence Tradecraft Professional. 40 CPEs awarded for the course. This course is highly specialized following intelligence community tradecraft. You won’t get this at SANS. In fact, the SANs intelligence courses were developed by students who either took our courses directly or were taught academically with our content. You won't get this anywhere but from Treadstone 71. If you want purely technical, then this is not the course for you. If you want tradecraft that lays the foundation for a solid program, education that creates a lasting impact, then this is the course for you.
Course books and manuals will be provided to students upon accepted enrollment. This course follows traditional intelligence community tradecraft. Treadstone 71 has been teaching cyber intelligence courses in various forms for six years. From academic settings and corporate environments to government facilities. Our customers include some of the largest firms in the world many of whom are part of critical infrastructures recognizing the need to learn how to create intelligence (www.treadstone71.com). We support our training with onsite consulting services that teach you how to create a sustainable program aligned to stakeholders. Ultimately, we teach you what most vendors cannot or will not – how to fish for yourself.
Course Fee, Course Lab, and Materials Fee (includes books, templates, structured techniques application, etc.).
This course combines lecture, research, and hands-on team assignments. Students are best served using a PC but a MAC will do (a virtual machine running windows on the Mac is best if you only have a Mac).
How is this course different from the current Treadstone 71 Cyber Intelligence course?
This course provides definitive sections along the intelligence lifecycle that are in-depth. Students are required to demonstrate understanding and use of collection methods using defined targets and target case studies, understanding and applying analytic techniques, when and how to use analytic techniques and analytic types. Students are presented case studies for analysis, required to use tradecraft methods, and provide written reports in standard analytic format. Students are also required to orally present their deliverables to the class. You will leave this course with the tools, methods, and understanding necessary to enhance your intelligence program.
“The Cyber Intelligence Training delivered and created by Jeff Bardin will add rapid returns to both Cyber Intel Analysts, and your Security Operations. This very thorough class adequately prepares the student for your Cyber Intelligence function. This class starts with the history of intelligence as a tradecraft and the evolution to the digital corporate world. Along the way, each student receives quality instruction and hands-on experience with today’s OSINT tools. This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.”
“The class was very detail orientated with a strong focus on the work of Cyber threats and how to better secure your assets against potential attacks. For most scenarios, we went through he had an open source tool, or the link to a paid version, to monitor or prevent the attacks from occurring. He was able to answer each and every question asked with specific details, and then some. I would sign up again right away for any other classes offered by Jeff.”
"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me forreal world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS. SANS does not compare. They are more of a class mill today. The Treadstone 71 course material is unique, focused, and timely."
“The Cyber Intelligence training offered by Treadstone71 is definitely an outstanding course and I recommend it for any organization looking to implement an intelligence capability. Jeff Bardin is extremely knowledgeable in the intelligence tradecraft and applies it to the cyber realm in a way that is understandable, exciting to learn and makes it easy to achieve “quick wins” in the organization after completing his class. Jeff provided the class with a multitude of tools, templates, and documents that can immediately be used by any organization focused on intelligence collection and analysis. Jeff arrived well prepared to teach the course and one of the most impressive aspects of the class was that he prese