Building and Enhancing Your CTI Program with Strategic Intelligence Analysis - The Formula!

Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time

   Watch Promo   Enroll in an Intel Course

Builgind Your Cyber Intelligence Program

This online course teaches, instructs, guides, and aids students in building a proper cyber intelligence program. We begin from nothing supplying guidance proven through program build campaigns across different verticals and four continents.

We designed the course to guide organizations in their cyber and threat intelligence program builds through online lectures, demonstrations, and templates covering the full intelligence lifecycle at a minimum. After years of teaching intelligence courses and delivering intelligence programs to clients, Treadstone 71 now offers this step-by-step course. We take students through the strategic planning process, goals and objectives creation, stakeholder analysis, adversary targeting and threat matrices creation, priority intelligence requirements, collection planning, structured analytic technique usage, analysis, maturity assessments, SOP development, threat intelligence platform selection, analytic writing, and dissemination non-inclusively.

The program includes instructional videos tied to content with periodic direct access to Treadstone 71 for client deliverable reviews. We supply templates and examples that you can use, change, or get ideas from. Artifacts specifically designed for past clients. The peer-review process follows a standard cycle including comments, suggestions, recommendations, and examples of previously finished products. Treadstone71 also offers regular ‘professor’ office hours for Q&A as requested in Office Hour Packs.

The program follows proven methods established over the years while creating intelligence programs. Clients move at a regular pace that corresponds with their internal schedules that Treadstone 71 helps to set up with the client.

We offer the program in different definitive sections giving students time to work artifacts, ideas, and the program with their stakeholders. The program also offers the standard Cyber Intelligence Tradecraft Certification training as an add-on.

Syllabus

Section

Content

Course Title

Building and Enhancing Your CTI Program with Strategic Intelligence Analysis

Course Description

Step‑by‑step self‑paced course guides students from zero to a fully operational cyber intelligence program. Content draws on proven methods across four continents and follows the full intelligence lifecycle. Online lectures, demonstrations and peer‑reviewed templates enable learners to produce strategic plans, maturity assessments, SOPs, collection plans, analytic products and dissemination models.

Target Audience

Intelligence team leads, cyber threat program managers, SOC and IR leadership, CISO/CSO and CIO staff, security operations teams, enterprise risk officers and consultants seeking to build or mature an in‑house cyber intelligence capability.

Prerequisites

Familiarity with basic cybersecurity concepts and organizational risk management.

Learning Objectives

Participants will develop mission, vision and guiding principles; conduct stakeholder analysis; create adversary targeting matrices and priority intelligence requirements; design collection workflows with chain‑of‑custody controls; apply structured analytic techniques and ACH; produce intelligence reports and briefings; define SOPs, RACI models and process flows; assess program maturity; select and configure threat intelligence platforms; and implement an ongoing training and peer‑review cycle.

Course Format

On‑demand video lectures, live office hours and template reviews via scheduled calls. Peer‑review cycles and direct access to Treadstone 71 for feedback.

Technical Requirements

Internet access; modern web browser with extension‑installation permissions; ability to download and edit document templates; PC or laptop capable of handling standard office software.

Module Outline

See module table below.

Assignments & Assessments

Quizzes accompanying key lessons; hands‑on assignments producing real artifacts (stakeholder maps, matrices, SOP drafts, collection plans and analytic reports); peer‑review feedback rounds; capstone deliverable of a complete program package.

Resources & Readings

Downloadable templates and examples from past client engagements; reference materials on IAFIE standards, Sherman Kent School directives and intelligence community best practices; curated articles on maturity models and platform selection.

Schedule & Timeline

Self‑paced with all modules available on demand; suggested 12‑week progression aligned to weekly module releases.

Instructor Information

Treadstone 71 subject‑matter experts. Access via class email, office hour packs and scheduled video conferences.

Certification & Credits

Certificate of Completion in Cyber Intelligence Program Development. Continuing Professional Education credits available upon request.

Module‑by‑Module Outline

Module #

Module Title

Summary of Topics Covered

Assignment or Activity

1

Data Provenance, OPSEC and Persona Construction

Chain‑of‑custody rules; browser‑based evidence capture with Hunchly; rules of engagement and safe persona development

Produce an OPSEC plan and Hunchly capture demonstration

2

Strategic Intelligence Analysis Part I

Foundations of strategic planning; mission, vision, guiding principles; goals and objectives creation

Draft vision, mission and guiding principles

3

Building Program – Stakeholder Analysis

Stakeholder domain mapping; influence vectors; tracking and prioritization; introduction to RACI and process flow diagrams

Create a stakeholder map with RACI definitions

4

Strategic Intelligence Analysis Part II

Priority intelligence requirements; adversary targeting matrices; threat taxonomy templates

Develop targeting matrix and PIR document

5

Collection Planning and Source Management

Collection lifecycle; open‑source tools and browser add‑ons; Mitre ATT&CK for planning; source evaluation criteria

Design a collection plan with tool selection and provenance controls

6

Analytic Techniques and ACH

Structured analytic techniques overview; introduction to ACH; bias mitigation; cognitive elements in analysis

Conduct an ACH exercise on a sample scenario

7

Strategic Intelligence Analysis Part III and Writing

Analytic writing best practices; BLUF and AIMS structuring; report templates and briefing formats

Draft and peer‑review an intelligence report

8

Structured Analytic Techniques Deep Dive

Advanced SATs including STEMPLES Plus and Hofstede indicators; visual logic maps; critical‑thinking tool integration

Apply STEMPLES Plus to a real or simulated intelligence case

9

Program Maturity Assessment and SOP Development

Capability maturity model assessment; SOP drafting; standard operating procedures for collection, analysis and dissemination

Develop an SOP draft and maturity self‑assessment worksheet

10

Threat Intelligence Platform Selection and Metrics

RFP process; vendor data feed evaluation; platform comparison criteria; metric identification for performance measurement

Produce a platform selection report with metric definitions

11

Implementation, Training and Knowledge Transfer

Peer‑review cycles; office‑hour pack utilization; training plans for staff certification; continuous improvement processes

Create a training and knowledge‑transfer schedule template

12

Capstone Program Assembly and Final Delivery

Integration of all artifacts into a comprehensive program package; tabletop exercise demonstration; argument mapping of program strategy; final presentation to stakeholders

Assemble and present the complete cyber intelligence program

What do you have at the end of the program?

As clients carefully follow the training and timelines, executing the deliverables internally, clients will have built a complete cyber threat intelligence program. The program definition, strategy, policies, procedures, process flow diagrams, roles, responsibilities, templates, models, methods, tactics, techniques, reports, dissemination models, briefings, table-top exercises, as well as certified Cyber Intelligence Tradecraft professionals are all core components of what clients achieve.

We offer the standard model that follows the cyber intelligence lifecycle with standard office hours. We also offer added Office Hour Packs beyond the standard. Should you wish to certify staff during the training, we can upgrade you to the Certification module. Lastly, we also offer the most comprehensive add-on, the Strategic Intelligence Analysis upgrade. How do you know which is best for you? We take you through the first reviews and assessments to decide what best suits your culture, needs, and pricing model.

If you wish to learn more, contact us to schedule a review of this extensive and comprehensive assisted training program.



Your Instructor


Treadstone 71
Treadstone 71

Treadstone 71 is a woman and veteran-owned small business exclusively focused on cyber and threat intelligence consulting, services, and training. We are a pure-play intelligence shop.

Training dates and locations here

Since 2002, Treadstone 71 delivers intelligence training, strategic, operational, and tactical intelligence consulting, and research. We provide a seamless extension of your organization efficiently and effectively moving your organization to cyber intelligence program maturity. Our training, established in 2008, follows intelligence community standards as applied to the ever-changing threat environment delivering forecasts and estimates as intelligence intends. From baseline research to adversary targeted advisories and dossiers, Treadstone 71 products align with your intelligence requirements. We do not follow the create once and deliver many model. We contextually tie our products to your needs. Intelligence is our only business.

  • We use intuition, structured techniques, and years of experience.
  • We supply intelligence based on clearly defined requirements.
  • We do not assign five people to do a job only one with experience.
  • We do not bid base bones only to change order you to overspending.
We do not promise what we cannot deliver. We have walked in your shoes. We understand your pressures.

We are known for our ability to:

  • Anticipate key target or threat activities that are likely to prompt a leadership decision.
  • Aid in coordinating, validating, and managing collection requirements, plans, and activities.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives as related to designated cyber operations warning problem sets.
  • Produce timely, fused, all-source cyber operations intelligence and indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
  • Provide intelligence analysis and support to designated exercises, planning activities, and time-sensitive operations.
  • Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or no precedent exists.
  • Recognize and mitigate deception in reporting and analysis.
    Assess intelligence, recommend targets to support operational objectives.
  • Assess target vulnerabilities and capabilities to determine a course of action.
  • Assist in the development of priority information requirements.
  • Enable synchronization of intelligence support plans across the supply chain.
  • ...and Review and understand organizational leadership objectives and planning guidance non-inclusively.

Course Curriculum


  Speed Reading and Collection Management - Source Evaluation - Evidence
Available in days
days after you enroll
  Technical Security - Threat Intelligence
Available in days
days after you enroll
  Blue - Red - Purple
Available in days
days after you enroll
  Start Building and Enhancing Your Program - Stakeholder Analysis
Available in days
days after you enroll
  Building and Enhancing Your Program - Collection Management
Available in days
days after you enroll
  Building and Enhancing Your Program - STEMPLES Plus - Indicators of Change - Hofstede Principles
Available in days
days after you enroll
  Strategic Intelligence Analysis Week 10
Available in days
days after you enroll
  Building a Cyber Intelligence Program - Parts 2 & 3
Available in days
days after you enroll
  Argument Mapping and Threat Hunting
Available in days
days after you enroll

Frequently Asked Questions


When does the course start and finish?
The course starts now and never ends! It is a completely self-paced online course - you decide when you start and when you finish.
How long do I have access to the course?
How does lifetime access sound? After enrolling, you have unlimited access to this course for as long as you like - across any and all devices you own.
What if I am unhappy with the course?
We would never want you to be unhappy! If you are unsatisfied with your purchase, contact us in the first 30 days and we will give you a full refund.

Get started now!