This course includes the full intelligence lifecycle plus another 6 hours of in-depth instruction into specific areas of the cyber intelligence lifecycle.


Separately - $5,389.00

$5,899

Certified Cyber Intelligence Analyst Plus 5 Webinars

Since 2002 - The only pure play cyber intelligence firm that adheres to intelligence community standards. We teach you how to fish.

Treadstone 71 - We See What Others Cannot

PHIA

This is an on-demand course.

The online courses are instructor video and audio recorded with periodic direct interaction with the instructor via online web meetings. The instructor will have standard office time for question and answer as well as regular access via class email and other messaging options.

Validated and registered students will receive login and preparation information 1 week prior to class start. Prospective students must send an email to [email protected] from a corporate account to validate course eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors.

This course follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training (IAFIE) and the Professional Head of Intelligence Analysis Framework (PHIA):

I. Introduction to Intelligence

II. Critical Thinking

III. Analytic Writing

IV. Creative Thinking

V. Analytic Briefing

VI. Structured Analytic Techniques.

VII. Analytic Issues

VIII. Argument Mapping

IX. Case Studies

Latest student testimonial: 

"With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real world scenarios establishing a solid understanding on utilizing these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional."

Anonymity and Passive Persona setup

Collection Methods and Techniques - WITH AN ADDED LECTURE ON COLLECTION MANAGEMENT

Collection Planning, IRs/PIRs/EEIs/Indicators/SIRs WITH AN ADDED LECTURE ON INTELLIGENCE REQUIREMENTS

Collection Process Flow

Collection (OSINT) Tools and Targeting

Threat Intelligence WITH AN ADDED LECTURE ON ADVERSARY TARGETING (D3A AND F3EAD) AND THREAT MATRICES

Most likely Threat Actors

Hunch.ly

Use of Maltego – overview

OPSEC – VPNs, Buscador, WITH AN EXTENDED OPSEC LECTURE

Proxy Access – the DarkNet

Burn phone setup and use (US Only)

Open Source Intelligence OSINT

Production Methods

Structured Analytic Techniques – Their use

Adversary Denial and Deception

Source Credibility and Relevance

Source Validation

Denial and Deception

Confidence Levels

Types of evidence

Production Management

Critical and Creative Thinking

Cognitive Bias

Glossary and Taxonomy

What Intelligence Can and Cannot Do

Use of Mitre ATT&CK in Analysis

ATT&CK in examining patterns and trends

ATT&CK in Adversary tendencies

Estimation and Forecasting

Campaign analysis

Types and Methods of Analysis

Synthesis and Fusion

Analysis of Competing Hypothesis

Inductive/Abductive/Deductive Reasoning

Stakeholder Identification, and Analysis WITH AN ADDED LECTURE ON STAKEHOLDER MANAGEMENT

Analytic Writing, BLUF, AIMS

Forecasting in your writing

STEMPLES Plus, Indicators of Change WITH AN ADDED LECTURE ON STEMPLES Plus, Indicators of Change and Hofstede Principles

Argument Mapping

Types of Reports

Product Line Mapping

Report Serialization, and Dissemination

  • Live Case Studies – Class briefs
  • All Case Studies use all methods, techniques, and tools referenced in the course material. The Case Studies used are straight from the headlines giving students real world experience during the class.

All students receive 2 books and 50 plus course documents, VPN, and other course material.

Students who complete the course will be certified as Cyber Intelligence Tradecraft Professional. 40 CPEs awarded for the course. This course is highly specialized following intelligence community tradecraft. You won’t get this at SANS. You won't get this anywhere but from Treadstone 71. If you want purely technical, then this is not the course for you. If you want tradecraft that lays the foundation for a solid program, education that creates a lasting impact, then this is the course for you.

Course books and manuals will be provided to students upon accepted enrollment. This course follows traditional intelligence community tradecraft. Treadstone 71 has been teaching cyber intelligence courses in various forms for six years. From academic settings and corporate environments to government facilities. Our customers include some of the largest firms in the world many of whom are part of critical infrastructures recognizing the need to learn how to create intelligence (www.treadstone71.com). We support our training with onsite consulting services that teach you how to create a sustainable program aligned to stakeholders. Ultimately, we teach you what most vendors cannot or will not – how to fish for yourself.

Course Fee, Course Lab, and Materials Fee (includes books, templates, structured techniques application, etc.).

This course combines lecture, research, and hands-on team assignments. Students are best served using a PC but a MAC will do (a virtual machine running windows on the Mac is best if you only have a Mac).

How is this course different from the current Treadstone 71 Cyber Intelligence course?

This course provides definitive sections along the intelligence lifecycle that are in-depth. Students are required to demonstrate understanding and use of collection methods using defined targets and target case studies, understanding and applying analytic techniques, when and how to use analytic techniques and analytic types. Students are presented case studies for analysis, required to use tradecraft methods, and provide written reports in standard analytic format. Students are also required to orally present their deliverables to the class. You will leave this course with the tools, methods, and understanding necessary to enhance your intelligence program.

“The Cyber Intelligence Training delivered and created by Jeff Bardin will add rapid returns to both Cyber Intel Analysts, and your Security Operations. This very thorough class adequately prepares the student for your Cyber Intelligence function. This class starts with the history of intelligence as a tradecraft and the evolution to the digital corporate world. Along the way, each student receives quality instruction and hands-on experience with today’s OSINT tools. This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.”

“The class was very detail orientated with a strong focus on the work of Cyber threats and how to better secure your assets against potential attacks. For most scenarios, we went through he had an open source tool, or the link to a paid version, to monitor or prevent the attacks from occurring. He was able to answer each and every question asked with specific details, and then some. I would sign up again right away for any other classes offered by Jeff.”

"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me forreal world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS. SANS does not compare. They are more of a class mill today. The Treadstone 71 course material is unique, focused, and timely."

“The Cyber Intelligence training offered by Treadstone71 is definitely an outstanding course and I recommend it for any organization looking to implement an intelligence capability. Jeff Bardin is extremely knowledgeable in the intelligence tradecraft and applies it to the cyber realm in a way that is understandable, exciting to learn and makes it easy to achieve “quick wins” in the organization after completing his class. Jeff provided the class with a multitude of tools, templates, and documents that can immediately be used by any organization focused on intelligence collection and analysis. Jeff arrived well prepared to teach the course and one of the most impressive aspects of the class was that he prese