
On-Demand - Self Paced - Generative AI - Cyber Intelligence Tradecraft - Certified Intelligence Analyst -
On Demand - Cyber Intelligence Tradecraft Cyber Intelligence Training Course Newly extended and updated content with Generative AI.
Watch PromoOn-Demand · Self-Paced · Generative AI — Cyber Intelligence Tradecraft (Certified Threat Intelligence Analyst)
Newly extended and updated with Generative AI. Earn 52 CPE hours across 15 AI-enhanced modules that merge instructor-led video, rolling mentoring, and interactive labs. Sharpen OSINT, darknet collection, structured analytic techniques, bias mitigation, and AI-powered reporting aligned to IAFIE standards. Completion grants Certified Threat Intelligence Analyst status.
Start Now Preview SyllabusDelivery Mode
On-Demand · Self-Paced · Instructor-Supported
Course Length
Flexible path over sixteen weeks · 52 CPE Credits
Lead Mentor
Direct guidance from Treadstone 71 founder Jeff Bardin · Rolling office hours
Course Overview
Registration runs on-demand from the Cyber Intelligence Training Center page. Validated students receive login and preparation information one week before class access. Prospective students must email [email protected] from a corporate account for eligibility validation. Treadstone 71 may restrict registration based on risk.
Who Should Attend
Intelligence analysts and advanced analysts, peer reviewers, analytic writers, open-source collectors and researchers, cyber risk and threat management professionals, incident response and security operations leadership, CISOs and CIOs, cybercrime investigators, recipients of internal or external intelligence reporting, and professionals seeking tradecraft with AI-assisted methods.
Registration & Course Delivery
Standards & Certification
Delivery & Support
Program Specifications
Audience | CISOs, CIOs, SOC and IR leadership, intelligence staff, cybercrime investigators, analysts, reviewers, researchers, and writers |
---|---|
Prerequisites | Familiarity with internet browsers, Office 365, and general intelligence concepts |
Learning Outcomes | Describe the evolution of cyber intelligence and AI-augmented collection; apply critical and creative thinking to mitigate bias; draft structured reports with AI assistants; execute advanced OSINT and darknet collection; employ AI-driven fusion and geospatial analysis; configure anonymous browsing; validate sources and score credibility; develop PIRs; map adversary behavior with ATT&CK and Diamond; run live case studies; deliver IAFIE-aligned products. |
Format | On-demand recorded modules plus scheduled live meetings, office hours, and direct messaging |
Technical Requirements | Internet access; modern browser with extension permissions; ability to install required software on a PC or laptop |
Assessment | Quizzes, hands-on labs, scenario exercises, and a capstone AI-enhanced threat intelligence brief with structured analysis |
Resources | Two core textbooks and 50+ downloadable documents, reference guides, and white papers; IAFIE standards; vendor documentation for AI and OSINT tools |
Schedule | Self-paced with flexible access to all modules; no fixed start or end date |
Credits | 52 Continuing Professional Education credits; certification as Threat Intelligence Analyst on completion |
Module Outline
15 AI-Enhanced Modules
# | Module Title |
---|---|
1 | Evolution of Cyber Intelligence and AI-Driven Collection |
2 | Critical Thinking and AI-Assisted Bias Detection |
3 | Analytic Writing and AI Tools |
4 | Creative Thinking and Adversarial Simulation |
5 | Data Visualization and AI-Assisted Presentations |
6 | Structured Analytic Techniques and Hypothesis Testing |
7 | Intelligence Fusion and Strategic Foresight |
8 | Anonymity, OPSEC, and Passive Persona Setup |
9 | OSINT, Deep/Dark Web, and Collection |
10 | Network and Influence Analysis |
11 | Technical Models |
12 | Source Validation, Credibility Scoring, and Confidence Levels |
13 | Production Management and Dissemination |
14 | AI-Enhanced Forecasting, Campaign Analysis, and Bias Mitigation |
15 | Live Headline-Based Case Studies |
Practical Takeaways
Lead Instructor
Forty years of intelligence experience are built into this online recorded course with the availability for instructor office hours or email/text Q&A
Course Accolades
— Enterprise Security Leader
— Senior Threat Analyst
Access on-demand modules, live support, templates, and case-driven labs. Progress at your pace and deliver professional intelligence products.
Course material is not for resale or commercial use outside the end-user license agreement and may not be used for competitive purposes.
Your Instructor

Treadstone 71 is a woman and veteran-owned small business exclusively focused on cyber and threat intelligence consulting, services, and training. We are a pure-play intelligence shop.
Training dates and locations here
Since 2002, Treadstone 71 delivers intelligence training, strategic, operational, and tactical intelligence consulting, and research. We provide a seamless extension of your organization efficiently and effectively moving your organization to cyber intelligence program maturity. Our training, established in 2008, follows intelligence community standards as applied to the ever-changing threat environment delivering forecasts and estimates as intelligence intends. From baseline research to adversary targeted advisories and dossiers, Treadstone 71 products align with your intelligence requirements. We do not follow the create once and deliver many model. We contextually tie our products to your needs. Intelligence is our only business.
- We use intuition, structured techniques, and years of experience.
- We supply intelligence based on clearly defined requirements.
- We do not assign five people to do a job only one with experience.
- We do not bid base bones only to change order you to overspending.
We are known for our ability to:
- Anticipate key target or threat activities that are likely to prompt a leadership decision.
- Aid in coordinating, validating, and managing collection requirements, plans, and activities.
- Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives as related to designated cyber operations warning problem sets.
- Produce timely, fused, all-source cyber operations intelligence and indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
- Provide intelligence analysis and support to designated exercises, planning activities, and time-sensitive operations.
- Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or no precedent exists.
- Recognize and mitigate deception in reporting and analysis.
Assess intelligence, recommend targets to support operational objectives. - Assess target vulnerabilities and capabilities to determine a course of action.
- Assist in the development of priority information requirements.
- Enable synchronization of intelligence support plans across the supply chain.
- ...and Review and understand organizational leadership objectives and planning guidance non-inclusively.