Qx4vpbb3qouaa9gm3s0z

Subscription On Demand-Cyber Intelligence 2 Year Program

Subscription to All Treadstone 71 Online Training plus Access to CyberIntellipedia plus Four Weeks Consulting - Terms and Conditions Apply

   Watch Promo

Treadstone 71 announces our new Training Subscription Program for Cyber Intelligence. Bring your teams together and harness the power of team-based, corporate targeted, virtual cyber intelligence learning. Treadstone 71 delivers a comprehensive set of cyber threat intelligence and counterintelligence training for your organization geared to instruct and provide hands-on learning while maturing your program. Our courses are specifically built targeting the cyber intelligence lifecycle.

Everybody is offering online subscriptions! Why is ours different?

Great question! We not only offer intelligence training developed by intelligence community professionals, but our offer also delivers knowledgebase access, and four weeks of consulting over a two-year period if you act soon. Read on ->

Our two-year subscription program geared towards the company and not the individual delivers access to all Treadstone 71 online training and certifications over a period of 24 months. Our one price program enables an unlimited number of your employees to take our courses as desired within a 24-month period. This includes courses and webinars covering:

  • Analytic Writing
  • Adversary Targeting
  • Collection Management
  • Collection Manager's Course
  • Cyber CounterIntelligence Tradecraft - Certified Threat CounterIntelligence Analyst
  • Cyber Intelligence Tradecraft - Certified Threat Intelligence Analyst
  • Intelligence for the C-Suite
  • Intelligence Requirements
  • Open Source Intelligence
  • Stakeholder Management
  • STEMPLES Plus - Indicators of Change
  • Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
  • Structured Analytic Techniques

The process is simple. Signup for the subscription service, provide the initial list of your employees, and sit back and watch them perform. How do you track their training activities? Treadstone 71 provides the following reports:

  • Individual Progress Reports
  • Graded Quiz Scores (when applicable)
    • Graded quiz results showing the student’s quiz answers. The option the students selected for each question is shaded green.
    • We can set the passing grade for a standard 80% or at any number you wish, allow as many retakes as you wish of the quiz and reset the quiz so students can retake the quizzes.
  • Lectures Completed with video completion heatmap
    • The video heatmap indicates which parts of a video have been watched (green), re-watched (yellow), re-watched multiple times (orange) or skipped (white). Of course, we can require video completion before allowing the student to move to the next lecture.
    • New heatmaps for each video watching session.
  • The ability to reset lecture, video, and quiz progress.

Treadstone 71 even gives you the ability to manage your students. Your point of contact for the Treadstone 71 online training will be able to add new users, unenroll students, and view user information in the Users section of the School Administration.

We will also customize your course area with your logos, your documents (8 hours of document modifications included in the price), and your internal videos if so desired. This gives your course a more personal touch with standard corporate logos.

Not only can you manage your own students, but Treadstone 71 will adjust case studies to fit your organization, your vertical, and your industry. This provides greater relevance to you learning activities.

How do we apply the knowledge gained into an actual program?

We help you with this in two ways:

  • Not only do you get unlimited access for an unlimited number of students for two years, but if you act within the next 120 days, Treadstone 71 will provide access CyberIntellipedia-our online knowledgebase wiki. This wiki is an online system for collaborative data sharing built and used by Treadstone 71 to aid in building Cyber Threat Intelligence programs while establishing intelligence sharing and communities of interest.
    • The Treadstone 71 Cyber Intelligence Training Courses led to the establishment of CyberIntellipedia, a wiki consisting of multiple sections covering strategic planning, policies, procedures, templates, taxonomy, examples, dossiers, finished intelligence, estimative intelligence, open-source tools, adversary research, process flow diagrams, reporting, analytic tools and methods, threat intelligence TTPs, and more. From job descriptions and C-Suite presentations to cyber intelligence maturity models and threat matrices.
    • CyberIntellipedia aligns with the Treadstone 71 Cyber Intelligence Training Courses including aspects of cyber intelligence tradecraft and cyber counterintelligence tradecraft. The wiki follows the intelligence lifecycle providing in-depth documentation for each aspect of the iterative process. We continue to enhance and build CyberIntellipedia including adding a historical cyber adversary component covering attacks, adversaries, their methods, tactics, techniques, and procedures indexed for rapid search.
    • CyberIntellipedia delivers the tools necessary to build a sustainable program. The wiki gives users access to twelve years of effort demonstrating proven success for cyber threat intelligence strategies, operational efficiencies, tactical methods, and technical alignment.
    • Organizations pay hundreds of thousands of dollars over years of labor to establish what is in the Cyber & Threat Intelligence Wiki - CyberIntellipedia. With guidance and time-based direction, clients can build a complete intelligence program, educate stakeholders, staff, and leadership, without the usual massive outlay for time and materials, and commitment to constant consultant change orders.
  • By acting within the next 120 days to subscribe to the Treadstone 71 training, you will also receive four weeks of consultative support over the two-year period. We will assess your intelligence program status, help you apply the learning, assist you with the structure of your cyber and threat intelligence strategic plan, and provide a detailed project plan and maturity roadmap. Since this is four weeks over two years, we can assess where you are and deliver locally relevant goals, objectives, and measurable target outcomes.

How many CPEs can each student earn?

Every student can earn:

Analytic Writing

24 CPE

Adversary Targeting

2 CPE

Collection Management

2 CPE

Collection Manager's Course

40 CPE

Cyber CounterIntelligence Tradecraft - Certified Threat CounterIntelligence Analyst

40 CPE

Cyber Intelligence Tradecraft - Certified Threat Intelligence Analyst

40 CPE

Intelligence for the C-Suite

6 CPE

Intelligence Requirements

2 CPE

Open Source Intelligence

24 CPE

Stakeholder Management

2 CPE

STEMPLES Plus - Indicators of Change

6 CPE

Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence

40 CPE

Structured Analytic Techniques

40 CPE

TOTAL CPEs POSSIBLE

244 CPE

  • What do I need to access and perform the training?
    • An internet connection, a laptop (Windows works best due to the open source tools), and a desire to excel.
  • How will this help our company with cyber threat intelligence?
    • Our training follows intelligence community standards and includes practical and pragmatic approaches to intelligence learned over the past 38 years.
  • Do we have to pay all at once?
    • Treadstone 71 offers quarterly payments, bi-annual, and annual payments.
  • How many times can a student take the same courses?
    • As many times as they wish.
  • Is the training self-paced?
    • Our longest courses are geared for 8 weeks (40 CPE courses) but this timeframe can easily be extended.
  • Can we work in groups?
    • Treadstone 71 highly recommends groups in our training since intelligence is a team exercise. We find groups made up of different internal team members makes for a great way to build camaraderie and understanding.

The Treadstone 71 Online Cyber and Threat Intelligence Subscription Program reduces your training budget while delivering industry standard instruction coupled with an extensive knowledgebase and complemented by a four week in-person and online assessment and support program. Working from home and online training are nothing new. 24x7 portal access gives students the ability to tackle learning when they are available. The portal also has an iOS specific app for iPhone and iPad users.

So, what do you get?

  • Any-time access for two years.
  • Developed and delivered by Intelligence Community professionals.
  • Instructor offices hours, access via Slack, questions via online comments, direct access to secure methods of communication to the instructor.
  • Two-year unlimited number of students’ access to all Treadstone 71 online courses.
    • Students also receive course books via the Kindle App (for courses with books), two-year VPN access, two-year access to Hunchly, and lifetime access to Start.me and the Hemingway Editor.

If you subscribe in total by November 1, 2020, you also get:

  • Access to the Treadstone 71 online knowledgebase wiki – CyberIntellipedia
  • Four weeks of online and onsite cyber and threat assessments, program build, and strategic support.

The Treadstone 71 Online Cyber and Threat Intelligence Subscription Program reduces your training budget while delivering industry-standard instruction coupled with an extensive knowledgebase and complemented by a four week in-person and online assessment and support program. Working from home and online training are nothing new. 24x7 portal access gives students the ability to tackle learning when they are available.

For pricing and more details, contact Treadstone 71 and we will set up a time to chat at your convenience.Terms and conditions apply. Subscription in total refers to signed agreements and the first payment.



Your Instructor


Jeff Bardin
Jeff Bardin

Former adjunct professor of Cyber Intelligence, Counterintelligence, and Cybercrime (Utica College) and Information Security Risk Management (Clark University). Experienced in cyber intelligence lifecycle services and support, cyber counterintelligence services and analysis, active defense and cyber operations. Commercially teach Cyber Intelligence (Anonymity, Sockpuppets, Cyber Collection, Clandestine Cyber HUMINT, Socio-Cultural Aspects of Intelligence, Lifecycle, Critical Thinking, Cognitive Bias, Methods and Types of Analysis and Methods, Structured Analytic Techniques, Analytic Writing, BLUF/AIMS Delivery, and Dissemination), Jihadist Online Recruitment Methods, cyber influence operations, high-value target development, deception planning, deception operations management, Middle Eastern Cyber Warfare Doctrine, adversary dossier development and social-cultural analysis, jihadist training and gaming as a method of training, information and intelligence sharing, threat intelligence platform selection, non-inclusively.

Jeff Bardin is the Chief Intelligence Officer for Treadstone 71 with clients on 4 continents. In 2007, Jeff received the RSA Conference award for Excellence in the Field of Security Practices. His team also won the 2007 SC Magazine Award – Best Security Team. Jeff sits or has sat on the Board of Boston Infragard, Content Raven, Journal of Law and Cyber Warfare, and Wisegate and was a founding member of the Cloud Security Alliance. Jeff served in the USAF as a cryptologic linguist and in the US Army / US Army National Guard as an armor officer, armored scout platoon leader.

Mr. Bardin has extensive experience in cyber intelligence lifecycle services, program builds, targeted research and support, cyber counterintelligence services and analysis, deception planning, and cyber operations. He teaches Cyber Intelligence and Counterintelligence (Anonymity, Cyber Personas, Collection management, Clandestine Cyber HUMINT, Socio-Cultural Aspects of Intelligence, Critical Thinking, Cognitive Bias, Methods and Types of Analysis, Mitre ATT&CK, Structured Analytic Techniques, Analytic Writing, Briefings, and Dissemination), open source intelligence, strategic intelligence, operational/tactical/technical intelligence, and methods in media manipulation identification.

He has BA in Special Studies - Middle East Studies & Language from Trinity College and an MS in Information Assurance from Norwich University. Jeff also attended the Middlebury College Language School for additional language training. Mr. Bardin also spent two+ years studying Russian history, literature, political systems, and language. He lived and worked in the Mediterranean area, Europe, Australia, Singapore, Malaysia, the Persian Gulf Region, and the Kingdom of Saudi Arabia. Jeff was an adjunct instructor of master’s programs in cyber intelligence, counterintelligence, cybercrime and cyberterrorism at Utica College. Mr. Bardin has also appeared on CNN, CBS News Live, FoxNews, BBCRadio, i24News, BBN, and several other news outlets and has contributed bylines to Business Insider non-inclusively.

We started teaching these courses in 2009 and have continued to update and hone them while maintaining true to the intelligence community standards. We have since built cyber threat intelligence programs for Fortune 500 firms and government organizations on four continents while providing targeted research against adversaries and nation-states.

Treadstone 71:

We founded the company in 2002 and started creating cyber personas and infiltrating al-Qaeda sites collecting information and sharing it with various US-based organizations in 2004. In 2009-10, we started teaching Cyber Intelligence, Cyber CounterIntelligence and Cyber Crime courses at the master’s level at Utica College where we established the intelligence program. After three years of teaching at the academic level, we switched to the commercial space honing the courses to CIA/DIA style tradecraft as aligned to the cyber environment using the skills acquired in 2004. Since that time, we have continued to update the courses using real-world case studies as part of the training.

We have kept the company purposely small and now offer the training courses (www.treadstone71.com/cyber-intelligence-trainingan... www.cyberinteltrainingcenter.com) as well as Cyber Threat Intelligence maturity assessments, strategic and program planning, active research, collection, and reporting. We also perform Threat Intel Platform assessments, selection, and rollout activities for clients. We have clients in the US, EU, Australia, and Asia with active proposals in the Middle East. My personal background is as an Arabic Linguist (USAF / NSA), Russian Linguist, and CISO financial services, government contracts, insurance, and cybersecurity vendors. We have also acted as a critical resource for government CISOs in the past authoring their agency strategic plans, program plans and responding to Congressional inquiries on their behalf.

Jeff has spoken at RSA, NATO CyCon (Estonia), the US Naval Academy, the Air Force Institute of Technology, the Johns Hopkins Research Labs, Hacker Halted, Malaysian Cyberjaya, Secureworld Expo, Hacktivity (Budapest), IS2 Prague, London (RSA), ISSA, Security Camp (Cairo), and several other conferences and organizations.

Mr. Bardin has authored books and contributed chapters to several other books most recently Current and Emerging Trends in Cyber Operations from George Washington University. Recently edited and provided content for Understanding Computers: Today and Tomorrow by Deborah Morley, Charles S Parker - 11th edition (March 2006 release). Reviewer for Building an Information Security Risk Management Program from the Ground Up (Evan Wheeler), Author Chapter 33 Computer Information Security Handbook 5th Edition - SAN Security. Author Chapter on Satellite Security - Computer Information Security Handbook 6th Edition. Author - The Illusion of Due Diligence - Notes from the CISO Underground (April 2010 release).

Treadstone 71 is a pure play intelligence company focusing on targeted research of adversaries building in-depth dossiers recording methods, tactics, techniques, procedures, known associates, memberships and psychological profiles. We author Current, Research/Foundational, Advisories, STEMPLES Plus, and Estimative Intelligence reports. We create profiles of high value targets including ‘know your customer’ profiles delivering assessments and gaps in protections with recommendations and opportunities.

We are known for building Strategic Intelligence Programs from vision, mission, guiding principles, goals, objectives, 36-month plans, policies, procedures, process flows, SOPs, KPIs, CSFs, training and awareness programs for intelligence. We also help establish internal intelligence community programs from technical and tactical to operational and strategic including physical, competitive, business, and cyber.

We have taught classes to and/or worked with/for:

AIB, American Express, Capital One, NATO, Belgian Military Intelligence, Commonwealth Bank, Bank of America, ING, NCSC NL, American Electric Power, Nationwide, Battelle, Standard Chartered, Columbus Collaboratory, Anomali, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Cardinal Health, Huntington, L Brands, OhioHealth, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Davis Polk, Thrift Savings Plan, Discover, Equifax, Blackknight Financial Services, Schwab, GM, FRB, Intercontinental Exchange (ICE), Citizens Financial Group, Cleveland Clinic, Scottrade, MetLife, NY Life, Essent, Harvard University, Charles River Associates, Synchrony Financial, In-Q-Tel, TD Ameritrade, First Citizens Bank, M&T Bank, Western & Southern, American National Bank of TX, National Reconnaissance Office, OCBC Bank Singapore, Spentera, FBI, W.R. Berkley, F-Secure, People’s United Bank, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, Symantec, State of Florida, Deloitte, Ernst and Young, Mitsubishi UFG Trust and Banking Corporation, Target, Tri Counties Bank, Mass Mutual, Tower Research, Latham and Watkins LLP, Geller & Company, KeyBank, Northern Trust, Fannie Mae, BB&T, Blue Cross Blue Shield Michigan, Farm Credit Services of America, Aviation ISAC, Regions Financial Corporation, Intercontinental Exchange (The ICE), Vista Equity Partners, JP Morgan Chase, Archer Daniels Midland, Nacha, Barclays, Options Clearing Corporation (OCC), Expo2020, Abu Dhabi Smart Solution's and Services Authority, Merck & Co., Inc Nomura International, ING, Finance CERT Norway, iPipeline, BBVA, PenFED, Santander, Bank of America, Equifax, BNY Mellon, UBS Group, OCC, Verizon, Vantiv, Raymond James, Bridgewater Associates, Bank of America Merrill Lynch, BBVA, Promontory Interfinancial Network, Bank of Canada, Credit Suisse, HSBC, Church of Jesus Christ of Latter Day Saints, Ocean First Bank, International Exchange, Splunk, Vero Skatt, Ernst & Young, Relativity, Ultimate Software, Vista Equity Partners, Aetna, QBE Insurance Group, ACI Universal Payments, Betaalvereniging Nederland, Dutch Police, Motorola Solutions, Intel Corporation, Salesforce, Singapore Ministry of Defence, Australia and New Zealand Banking Group Limited (ANZ), National Australia Bank Limited, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Focus on targeted research of adversaries building in-depth dossiers recording methods, tactics, techniques, procedures, known associates, memberships and psychological profiles. Author Current, Research/Foundational, PESTELI, deception planning and operations, psychological operations, and Estimative Intelligence reports. Create profiles of high value targets including ‘know your customer’ profiles delivering assessments and gaps in protections with recommendations and opportunities.

Strategic Intelligence Program builds from vision, mission, guiding principles, goals, objectives, 36-month plans, policies, procedures, process flows, SOPs, KPIs, CSFs, training and awareness programs for intelligence. Building internal intelligence community programs from technical and tactical to operational and strategic including physical, competitive, business, and cyber.


Frequently Asked Questions


How does the course run?
The courses are geared to accommodate times for students globally. Meaning, office hours for discussions, questions/answers will vary weekly from 6AM Eastern Time to 6PM to 9PM (as examples) Eastern time based upon locations of enrolled students. Office hours will not be the same weekly unless all students happen to be from a specific time zone (unlikely this will happen). Courses are released in the 'drip' method just like attending a university course with weekly lectures, readings, and assignments. Recorded lectures will be available weekly for students to review. Lectures are followed by individual and team exercises that focus on Case Studies and online research cover the 8 weeks of the course. Normal time spent per week is from 5-6 hours. The office hours are live and not required but available should students have questions. Students may also contact the instructor directly via phone, text, Cyphr, Wickr, Signal, etc., should they have out of band questions. In addition, there will be an online forum for online Q&A. The online course is exactly the same as the face to face minus the travel. Same content, same books, etc. We just start and finish on Saturday. Office Hours: • These are much like college office hours for Q&A. We may hold a lecture or 2 that is live and need-based upon student requests. We intend to keep office hours at no more than 60 minutes maximum. • Since the lectures will be available online, students will have an opportunity to review them throughout the course. • The team delivers, and it is the expectation that all on the team will actively participate. We are considering team ratings.
How long do I have access to the course?
The course runs for 2 years from the published start date although if you run into any potential issues, we can easily extend the course time. Just send us an email.
Once I enroll, what happens?
You receive an invitation email from Teachable.com, the online portal hosting our training classes. The email requires your registration into the course. One week before the course starts, we send you information on course requirements, what you will receive, links to other information, proper email addresses for books and other course information.
What do I need to access and perform the training?
An internet connection, a laptop (Windows works best due to the open-source tools), and a desire to excel.
How will this help our company with cyber threat intelligence?
Our training follows intelligence community standards and includes practical and pragmatic approaches to intelligence learned over the past 38 years. See https://www.treadstone71.com/index.php/company/benefits-of-treadstone-71-training for information on course benefits.
Do we have to pay all at once?
Treadstone 71 offers quarterly payments, bi-annual, and annual payments.
Is the training self-paced?
The subscription program is geared for 2 years (24 months / 104 weeks). Give us a shout should you find yourself getting behind.
Can we work in groups?
Treadstone 71 highly recommends groups in our training since intelligence is a team exercise. We find groups made up of different internal team members makes for a great way to build camaraderie and understanding.
Is there an option for smartphones or tablets?
The portal also has an iOS-specific app for iPhone and iPad users.
What can I expect as a student?
Any-time access for two years. /// Developed and delivered by Intelligence Community professionals. /// Instructor offices hours, access via Slack, questions via online comments, direct access to secure methods of communication with the instructor. /// Two-year unlimited number of students’ access to all Treadstone 71 online courses. /// Students also receive course books via the Kindle App (for courses with books), two-year VPN access, two-year access to Hunchly, and lifetime access to Start.me and the Hemingway Editor.
Course EULA
Course EULA - REQUIRED Treadstone 71 LLC ("T71") IS WILLING TO LICENSE THE T71 Cyber Intelligence Training (COLLECTIVELY, "COURSE") UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS NON-COMMERCIAL VERSION LICENSE AGREEMENT ("AGREEMENT"). PLEASE READ THESE TERMS CAREFULLY BEFORE MOVING AHEAD WITH THIS COURSE. BY INSTALLING OR USING THE INFORMATION ON THE PROVIDED USB, YOU ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, T71 IS UNWILLING TO LICENSE THE COURSE TO YOU ("YOU"), AND YOU SHOULD NOT INSTALL OR USE THE COURSE. NON-COMMERCIAL VERSION LICENSE To qualify for a Non-Commercial Version License, You must: (1) use the Course for non-commercial purposes as defined herein. The term "Non-Commercial Version License" is limited to using the concepts, methods, processes, procedures, and plans for internal organizational use. Entities are not allowed to teach this course or semblance of this course without express permission from Treadstone 71 LLC. Organizations are not allowed to deliver commercial services based upon this course that compete directly or indirectly with Treadtone 71 LLC. If You do not qualify for a Non-Commercial Version License, then you should discontinue the COURSE. GRANT OF LICENSE Provided that you qualify for a Non-Commercial Version License as specified above, and subject to the terms and conditions contained herein, T71 hereby grants You, an end user, a personal, non-transferable, non-exclusive, non-sublicensable license to install and use the COURSE, free of charge, for non-commercial purposes only. In addition, subject to the terms and conditions contained herein and provided that You meet the requirement specified above for an Non-Commercial Version License, T71 hereby grants to You, an end user, a non-transferable, non-exclusive, non-sublicensable license, free of charge, to (1) use the COURSE for the intent of building or expanding a cyber intelligence program within your organization. For the avoidance of doubt, the following are considered examples of commercial uses of the COURSE: (1) use for financial gain, personal or otherwise; (2) use by government agencies without recompense to T71; (3) use by a telecommunication or Internet service provider company with recompense to T71; (4) use in connection with administering a commercial web site; (5) use in connection with the provision of professional service for which you or your company or organization are compensated (including paid administration); (6) bundling or integrating the COURSE with any other product, service, or another COURSE product for commercial use. (7) teaching this course in a seminar, online, commercial or academic setting. T71 and/or its licensors reserve all rights not expressly granted to You herein. This license is not a sale of the COURSE or any copy of the COURSE. The COURSE contains valuable trade secrets of T71 and its licensors. All worldwide ownership of and all rights, titles and interests in and to the COURSE, and all copies and portions of the COURSE, including without limitation, all intellectual property rights therein and thereto, are and will remain exclusively with T71. The COURSE is protected, among other ways, by the copyright laws of the United States and international copyright treaties. All rights not expressly granted herein are retained by T71 and its licensors. USE RESTRICTIONS You may not: (i) use the COURSE, except under the terms listed above; (ii) create derivative works based on the COURSE (e.g. incorporating the COURSE in a commercial product or service without a proper license). (iii) copy the COURSE (iv) rent, lease, sublicense, convey, distribute or otherwise transfer rights to the COURSE; (v) remove any product identification, copyright, proprietary notices or labels from the COURSE; or (vii) use any T71 trademarks in any manner other than their presence within Your copy of the COURSE without written permission of T71. Any and all copies made by You as permitted hereunder must contain all of the original COURSE's copyright, trademark and other proprietary notices and marks. MAINTENANCE, SUPPORT AND UPDATES T71 is under no obligation to maintain or support or update the COURSE in any way, or to provide updates or error corrections CONFIDENTIALITY The COURSE and any license authorization codes are confidential and proprietary information of T71. You agree to take adequate steps to protect the COURSE and any license authorization codes, if any, from unauthorized disclosure or use. You agree that You will not disclose the COURSE, in any form, to any third party, except as otherwise provided herein. WARRANTY T71 EXPRESSLY DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT OF THIRD-PARTY INTELLECTUAL PROPERTY RIGHTS, AND ANY WARRANTY THAT MAY ARISE BY REASON OF TRADE USAGE, CUSTOM, OR COURSE OF DEALING. WITHOUT LIMITING THE FOREGOING, YOU ACKNOWLEDGE THAT THE COURSE IS PROVIDED "AS IS" AND THAT T71 DOES NOT WARRANT THAT THE COURSE WILL RUN UNINTERRUPTED OR ERROR FREE NOR THAT THE COURSE WILL OPERATE WITH HARDWARE AND/OR COURSE NOT PROVIDED BY T71. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THE AGREEMENT. SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU, AND YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE. TERMINATION This Agreement will terminate immediately and automatically without notice if You breach any provision in this Agreement. Upon termination You will remove all copies of the COURSE or any part of the COURSE from any and all computer storage devices and destroy the COURSE. At T71's request, You or your authorized signatory, will certify in writing to T71 that all complete and partial copies of the COURSE have been destroyed and that none remain in your possession or under your control. The provisions of this Agreement, except for the license grant and warranty, will survive termination. U.S. GOVERNMENT RIGHTS If You use the COURSE by or for any unit or agency of the United States Government, this provision applies. The COURSE shall be classified as "TRAINING COURSE", as that term is defined in the Federal Acquisition Regulation (the "FAR") and its supplements. T71 represents that the COURSE was developed entirely at private expense, that no part of the COURSE was first produced in the performance of a Government contract, and that no part of the COURSE is in the public domain. (1) If the COURSE is supplied for use by DoD, the COURSE is delivered subject to the terms of this license agreement and either (i) in accordance with DFARS 227.7202-1(a) and 227.7202-3(a), or (ii) with restricted rights in accordance with DFARS 252.227-7013(c)(1)(ii) (OCT 1988), as applicable. (2) If the COURSE is supplied for use by a Federal agency other than DoD, the COURSE is restricted computer COURSE delivered subject to the terms of this license agreement and (i) FAR 12.212(a); (ii) FAR 52.227-19; or (iii) FAR 52.227-14(ALT III), as applicable. RESTRICTED RIGHTS Use, duplication, or disclosure by the U.S. Government is subject to restrictions set forth in this agreement and as provided in DFARS 227.7202-1(a) and 227.7202-3(a) (1995),DFARS 252.227-7013(c)(1)(ii) (OCT 1988), FAR 12.212(a) (1995), FAR 52.227-19, or FAR 52.227-14 (ALT III), as applicable. Manufacturer is Treadstone 71 LLC, Fort Myers, FL 33912 EXPORT LAW You acknowledge and agree that the COURSE may be subject to restrictions and controls imposed by the United States Export Administration Act (the "Act") and the regulations thereunder. You agree and certify that neither the COURSE nor any direct product thereof is being or will be acquired, shipped, transferred, or re-exported, directly or indirectly, into any country, except pursuant to an export control license under the Act and the regulations thereunder, or will be used for any purpose prohibited by the same. By using the COURSE, You are acknowledging and agreeing to the foregoing, and You are representing and warranting that You will comply with all of the United States and other applicable country laws and regulations when either exporting or re-exporting or importing the COURSE or any underlying information technology. Further, You represent and warrant that You are not a national of a, Iran, Iraq, Libya, North Korea, Russia, Sudan or Syria or a party listed in the U.S. Table of Denial Orders or U.S. Treasury Department's list of Specially Designated Nationals. GOVERNING LAW This Agreement is governed by the laws of the State of Florida without regard to conflict of laws rules and principles. Application of the United Nations Convention on Contracts for the International Sale of Goods is expressly excluded. MISCELLANEOUS If any provision hereof shall be held illegal, invalid or unenforceable, in whole or in part, such provision shall be modified to the minimum extent necessary to make it legal, valid and enforceable, and the legality, validity and enforceability of all other provisions of this Agreement shall not be affected thereby. No delay or failure by either party to exercise or enforce at any time any right or provision hereof shall be considered a waiver thereof or of such party's right thereafter to exercise or enforce each and every right and provision of this Agreement. This Agreement will bind and inure to the benefit of each party's permitted successors and assigns. You may not assign this Agreement in whole or in part, without T71's prior written consent. Any attempt to assign this Agreement without such consent will be null and void. This Agreement is the complete and exclusive statement between You and T71 relating to the subject matter hereof and supersedes all prior oral and written and all contemporaneous oral negotiations, commitments and understandings of the parties, if any. In the case of any conflict between the terms of this Agreement and the provisions of any purchase order for the COURSE, the terms of this Agreement shall control. Please contact the Director of Business Development at T71 Fort Myers, FL 33912 888.714.0071 – [email protected]

This course is closed for enrollment.