Building and Enhancing Your CTI Program with Strategic Intelligence Analysis - The Formula!

Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time

   Watch Promo Enroll at the bottom of this page.
Building and Enhancing Your CTI Program with Strategic Intelligence Analysis - The Formula! —
Enrollment Open at the bottom of this page

Building and Enhancing Your CTI Program with Strategic Intelligence Analysis - The Formula!

Build a mature cyber intelligence program without guesswork. Follow a proven path from first charter to operational delivery across planning, collection, analysis, production, and review.

Start Now (scroll to the bottom to enroll) Preview Syllabus

Outcome-Driven

”Taken from the headlines” real artifacts during the course: strategy, SOPs, maturity map, collection plan, reporting templates, and stakeholder comms.

Field-Tested

Adopt methods shaped across sectors and continents with repeatable steps and clear checkpoints.

Mentored

Receive expert feedback on deliverables with structured peer review and actionable guidance.

Your Finished Stack

Strategy & Governance
Mission, vision, goals, measures, and executive narrative that wins backing.
Adversary & Stakeholders
Targeting matrices, influence maps, and requirement flows that guide action.
Collection & Analysis
Collection plan, SATs including ACH, bias controls, and assessment standards.
Program Development
SOPs, maturity assessment, intake model, and TIP selection criteria.
Production & Delivery
Report styles, dissemination playbook, and feedback cycle for improvement.
Certification
Cyber Intelligence Tradecraft Certification for team members who complete requirements.

Program Fit

Need Building and Enhancing Your CTI Program with Strategic Intelligence Analysis - The Formula! Generic Training
Produce real artifacts Included with reviews Slides without outputs
Bias-aware analysis ACH and SATs applied High-level references
Executive alignment Measurable outcomes Unclear next steps

Syllabus Preview (scroll towards the bottom for the complete syllabus)

Foundation → Charter, Mandate, and Outcomes
Define purpose, scope, and measures that guide every task. Establish intake and requirement paths that prevent noise.
Adversary & Stakeholder Mapping
Build targeting matrices and influence vectors. Align outputs to stakeholder timelines that drive action.
Collection Planning & SATs
Create a structured plan, run ACH, and document confidence levels with source evaluation notes.
Program Development & SOPs
Write procedures, set maturity goals, and select platforms with fit-for-purpose criteria.
Production, Delivery & Review
Adopt reporting standards, dissemination routes, and a repeatable review loop for improvement.

Outcomes From Learners

“Strategy became real once the team produced artifacts with clear measures. Stakeholders finally saw progress.”

— Program Manager, Financial Services

“Collection and analysis moved from ad hoc to disciplined. Reports now drive decisions.”

— CTI Lead, Manufacturing

Instructor

Instructor photo
Lead Instructor
The course is a recorded online delivered format developed by over 40 years of intelligence experience from Treadstone 71
Contact us for more info at [email protected]
Flexible Pricing

Access videos, templates, examples, and reviews. Progress at your pace with scheduled office hours from instructors.

Your Instructor


Treadstone 71
Treadstone 71

Treadstone 71 is a woman and veteran-owned small business exclusively focused on cyber and threat intelligence consulting, services, and training. We are a pure-play intelligence shop.

Training dates and locations here

Since 2002, Treadstone 71 delivers intelligence training, strategic, operational, and tactical intelligence consulting, and research. We provide a seamless extension of your organization efficiently and effectively moving your organization to cyber intelligence program maturity. Our training, established in 2008, follows intelligence community standards as applied to the ever-changing threat environment delivering forecasts and estimates as intelligence intends. From baseline research to adversary targeted advisories and dossiers, Treadstone 71 products align with your intelligence requirements. We do not follow the create once and deliver many model. We contextually tie our products to your needs. Intelligence is our only business.

  • We use intuition, structured techniques, and years of experience.
  • We supply intelligence based on clearly defined requirements.
  • We do not assign five people to do a job only one with experience.
  • We do not bid base bones only to change order you to overspending.
We do not promise what we cannot deliver. We have walked in your shoes. We understand your pressures.

We are known for our ability to:

  • Anticipate key target or threat activities that are likely to prompt a leadership decision.
  • Aid in coordinating, validating, and managing collection requirements, plans, and activities.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives as related to designated cyber operations warning problem sets.
  • Produce timely, fused, all-source cyber operations intelligence and indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
  • Provide intelligence analysis and support to designated exercises, planning activities, and time-sensitive operations.
  • Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or no precedent exists.
  • Recognize and mitigate deception in reporting and analysis.
    Assess intelligence, recommend targets to support operational objectives.
  • Assess target vulnerabilities and capabilities to determine a course of action.
  • Assist in the development of priority information requirements.
  • Enable synchronization of intelligence support plans across the supply chain.
  • ...and Review and understand organizational leadership objectives and planning guidance non-inclusively.

Course Curriculum


  Speed Reading and Collection Management - Source Evaluation - Evidence
Available in days
days after you enroll
  Technical Security - Threat Intelligence
Available in days
days after you enroll
  Blue - Red - Purple
Available in days
days after you enroll
  Start Building and Enhancing Your Program - Stakeholder Analysis
Available in days
days after you enroll
  Building and Enhancing Your Program - Collection Management
Available in days
days after you enroll
  Building and Enhancing Your Program - STEMPLES Plus - Indicators of Change - Hofstede Principles
Available in days
days after you enroll
  Strategic Intelligence Analysis Week 10
Available in days
days after you enroll
  Building a Cyber Intelligence Program - Parts 2 & 3
Available in days
days after you enroll
  Argument Mapping and Threat Hunting
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
It is a completely self-paced online course - you decide when you start and hopefully, it is within 12 months. We can extend.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for 12 months.

Get started now!