Training - Knowledgebase - Consulting Bundle Subscription

Treadstone 71 announces our new Training Subscription Program for Cyber Intelligence.

Bring your teams together and harness the power of team-based, corporate targeted, virtual cyber intelligence learning. Treadstone 71 delivers a comprehensive set of cyber threat intelligence and counterintelligence training for your organization geared to instruct and provide hands-on learning while maturing your program. Our courses are specifically built targeting the cyber intelligence lifecycle.

Everybody is offering online subscriptions! Why is ours different?

SUBSCRIBE BY 1 NOVEMBER 2020 AND RECEIVE ... READ ON

Great question! We not only offer intelligence training developed by intelligence community professionals, but our offer also delivers knowledgebase access, and four weeks of consulting over a two-year period if you act soon. Read on ->

Our two-year subscription program geared towards the company and not the individual delivers access to all Treadstone 71 online training and certifications over a period of 24 months. Our one price program enables an unlimited number of your employees to take our courses as desired within a 24-month period. This includes courses and webinars covering:

  • Analytic Writing
  • Adversary Targeting
  • Collection Management
  • Collection Manager's Course
  • Cyber CounterIntelligence Tradecraft - Certified Threat CounterIntelligence Analyst
  • Cyber Intelligence Tradecraft - Certified Threat Intelligence Analyst
  • Intelligence for the C-Suite
  • Intelligence Requirements
  • Open Source Intelligence
  • Stakeholder Management
  • STEMPLES Plus - Indicators of Change
  • Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
  • Structured Analytic Techniques

Treadstone 71 Subscription Services

Invalid Input

Invalid Input

Invalid Input

Invalid Input

Invalid Input

No Gmail, Hotmail, Outlook, Live, Yahoo, etc. We will only address requests from valid business/organizational email accounts.

Invalid Input

Invalid Input

The process is simple. Signup for the subscription service, provide the initial list of your employees, and sit back and watch them perform. How do you track their training activities? Treadstone 71 provides the following reports:

  • Individual Progress Reports
  • Graded Quiz Scores (if and when applicable)
    • Graded quiz results showing the student’s quiz answers. The option the students selected for each question is shaded green.
    • We can set the passing grade for a standard 80% or at any number you wish, allow as many retakes as you wish of the quiz and reset the quiz so students can retake the quizzes.
  • Lectures Completed with video completion heatmap
    • The video heatmap indicates which parts of a video have been watched (green), re-watched (yellow), re-watched multiple times (orange) or skipped (white). Of course, we can require video completion before allowing the student to move to the next lecture.
    • New heatmaps for each video watching session.
  • The ability to reset lecture, video, and quiz progress.

Treadstone 71 even gives you the ability to manage your students. Your point of contact for the Treadstone 71 online training will be able to add new users, unenroll students, and view user information in the Users section of the School Administration.

We will also customize your course area with your logos, your documents (8 hours of document modifications included in the price), and your internal videos if so desired. This gives your course a more personal touch with standard corporate logos.

Not only can you manage your own students, but Treadstone 71 will adjust case studies to fit your organization, your vertical, and your industry. This provides greater relevance to you learning activities.

How do we apply the knowledge gained into an actual program?

We help you with this in two ways:

  1. Not only do you get unlimited access for an unlimited number of students for two years, but if you act within the next 120 days, Treadstone 71 will provide access CyberIntellipedia-our online knowledgebase wiki. This wiki is an online system for collaborative data sharing built and used by Treadstone 71 to aid in building Cyber Threat Intelligence programs while establishing intelligence sharing and communities of interest.
    1. The Treadstone 71 Cyber Intelligence Training Courses led to the establishment of CyberIntellipedia, a wiki consisting of multiple sections covering strategic planning, policies, procedures, templates, taxonomy, examples, dossiers, finished intelligence, estimative intelligence, open-source tools, adversary research, process flow diagrams, reporting, analytic tools and methods, threat intelligence TTPs, and more. From job descriptions and C-Suite presentations to cyber intelligence maturity models and threat matrices.
    2. CyberIntellipedia aligns with the Treadstone 71 Cyber Intelligence Training Courses including aspects of cyber intelligence tradecraft and cyber counterintelligence tradecraft. The wiki follows the intelligence lifecycle providing in-depth documentation for each aspect of the iterative process. We continue to enhance and build CyberIntellipedia including adding a historical cyber adversary component covering attacks, adversaries, their methods, tactics, techniques, and procedures indexed for rapid search.
    3. CyberIntellipedia delivers the tools necessary to build a sustainable program. The wiki gives users access to twelve years of effort demonstrating proven success for cyber threat intelligence strategies, operational efficiencies, tactical methods, and technical alignment.
    4. Organizations pay hundreds of thousands of dollars over years of labor to establish what is in the Cyber & Threat Intelligence Wiki - CyberIntellipedia. With guidance and time-based direction, clients can build a complete intelligence program, educate stakeholders, staff, and leadership, without the usual massive outlay for time and materials, and commitment to constant consultant change orders.
  2. By acting within before 1 November 2020 (subscribe to the Treadstone 71 Subscription Bundle), you will also receive four weeks of consultative support over the two-year period. We will assess your intelligence program status, help you apply the learning, assist you with the structure of your cyber and threat intelligence strategic plan, and provide a detailed project plan and maturity roadmap. Since this is four weeks over two years, we can assess where you are and deliver locally relevant goals, objectives, and measurable target outcomes.

How many CPEs can each student earn?

Every student can earn:

Analytic Writing

 24 CPE

Adversary Targeting

 2 CPE

Collection Management

 2 CPE

Collection Manager's Course

40 CPE

Cyber CounterIntelligence Tradecraft - Certified Threat CounterIntelligence Analyst

40 CPE

Cyber Intelligence Tradecraft - Certified Threat Intelligence Analyst

40 CPE

Intelligence for the C-Suite

6 CPE

Intelligence Requirements

2 CPE

Open Source Intelligence

24 CPE

Stakeholder Management

2 CPE

STEMPLES Plus - Indicators of Change

6 CPE

Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence

40 CPE

Structured Analytic Techniques

40 CPE

TOTAL CPEs POSSIBLE

244 CPE

 

  • What do I need to access and perform the training?
    • An internet connection, a laptop (Windows works best due to the open source tools), and a desire to excel.
  • How will this help our company with cyber threat intelligence?
    • Our training follows intelligence community standards and includes practical and pragmatic approaches to intelligence learned over the past 38 years.
  • Do we have to pay all at once?
    • Treadstone 71 offers quarterly payments, bi-annual, and annual payments.
  • How many times can a student take the same courses?
    • As many times as they wish.
  • Is the training self-paced?
    • Our longest courses are geared for 8 weeks (40 CPE courses) but this timeframe can easily be extended.
  • Can we work in groups?
    • Treadstone 71 highly recommends groups in our training since intelligence is a team exercise. We find groups made up of different internal team members makes for a great way to build camaraderie and understanding.

The Treadstone 71 Online Cyber and Threat Intelligence Subscription Program reduces your training budget while delivering industry standard instruction coupled with an extensive knowledgebase and complemented by a four week in-person and online assessment and support program. Working from home and online training are nothing new. 24x7 portal access gives students the ability to tackle learning when they are available. The portal also has an iOS specific app for iPhone and iPad users.

So, what do you get?

  • Any-time access for two years.
  • Developed and delivered by Intelligence Community professionals.
  • Instructor office hours, access via Slack, questions via online comments, direct access to secure methods of communication to the instructor.
  • Two-year unlimited number of students’ access to all Treadstone 71 online courses.
    • Students also receive course books via the Kindle App (for courses with books), two-year VPN access, two-year access to Hunchly, and lifetime access to Start.me and the Hemingway Editor.
    • TERMS AND CONDITIONS APPLY

If you subscribe in total by November 1, 2020, you also get:

  • Access to the Treadstone 71 online knowledgebase wiki – CyberIntellipedia
    • Scores of plans, procedures, process flows, and methods all taken directly from cyber and threat intelligence program builds over the years.
  • Four weeks of online and onsite cyber and threat assessments, program build, and strategic support.

Treadstone 71 Subscription Services

Invalid Input

Invalid Input

Invalid Input

Invalid Input

Invalid Input

No Gmail, Hotmail, Outlook, Live, Yahoo, etc. We will only address requests from valid business/organizational email accounts.

Invalid Input

Invalid Input

For pricing and more details, contact Treadstone 71 using the form below and we will set up a time to chat at your convenience.  Terms and conditions apply. Subscription in total refers to signed agreements and the first payment.

Treadstone 71 at RSA

Deception, distortion, dishonesty are core to social media postings. Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided. The talk will cover methods of countering their messaging while applying these tactics to protect your own organization and brand. Moving from intelligence to counterintelligence is the natural next step in our evolution.

Learning Objectives:
1: Learn about Russian adversary methods of deception.
2: Learn tactics that utilize memetic engineering.
3: Learn how to counter the adversaries’ methods.

Cyber-Counterintelligence—Deception, Distortion, Dishonesty

Treadstone 71 Cyber Threat Intelligence Webinars

Treadstone 71 Cyber Threat Intelligence Webinars

Five One Hour Cyber Threat Intelligence Pre-recorded Webinars covering

Free Short Course on our cyber intelligence training courses (www.cyberinteltrainingcenter.com)


Webinar link to be provided upon enrollment.

REGISTRATION REQUIREMENT: A VALID COMPANY EMAIL ADDRESS - ANY REGISTRATION OUTSIDE THIS REQUIREMENT WILL BE REJECTED. DO NOT REGISTER WITH GMAIL, HOTMAIL, OUTLOOK, YAHOO, PROTONMAIL, MAIL, TUTANOTA OR ANY TEMPORARY OR NON-GOVERNMENT OR COMPANY EMAIL. COMPANY MUST BE LEGITIMATE. THE ORGANIZATION MUST NOT BE TIED TO AN ADVERSARY GOVERNMENT OR ORGANIZATION.

Students Receive:

  • 1 CPE per Webinar
  • Templates and Forms used in the Webinars
  • 10% discounts on Treadstone 71 Training (online and in-person) for up to 1 year from the last Webinar completion date (May 12 to May 11, 2021)

Student requirements:

  • Laptop
  • WebEx software
  • Earphones and microphone preferred

Cyber Threat Intelligence – Stakeholder Management

On-Demand Webinar Registration

  1. Support to Leadership
    1. During Webinar Exercise
  2. Purpose of Stakeholder Analysis
  3. Questions used to organize your products
  4. Know your customer checklist
  5. Getting started checklist
  6. High-level process overview
  7. Steps to follow
    1. Sample Invitation Letter
  8. Strategic Questioning and Listening
    1. Active and Empathic Listening
  9. Stakeholder Collection and Tracking Model
    1. Reporting formats for real-time interaction
    2. Choices of visual support materials
    3. Stakeholder Impact and Influence
  10. Exercise Redux
  11. Wrap-up // Q&A

Cyber Threat Intelligence – Adversary Targeting

On-Demand Webinar Registration

  1. What is D3A?
  2. D3A Targeting Requirements
    1. Adversary Identification
    2. Breakdown
  3. Bring in Stakeholder Requirements
  4. What is F3EAD?
  5. The D3A/F3EAD Integrated Process
    1. Aligned to the Cyber Threat Intelligence Lifecycle
    2. Integrated Lifecycle Breakdown
    3. The Full Lifecycle
  6. Logical Adversaries to Intelligence Requirement Development
    1. Building Threat Matrices
    2. Simple to Complex
    3. Inclusion of ATT&CK Groups aligned to Nation-States
  7. Exercise Redux
  8. Wrap-up // Q&A

Cyber Threat Intelligence – Intelligence Requirements

On-Demand Webinar Registration

  1. Introduction
  1. Priority Intelligence Requirements (PIR) – What are they?
    1. During Webinar Exercise
  2. Intelligence Requirements
  3. Common Adversaries
  4. Information Requirements Process Flow
    1. Intelligence Requirements
    2. Essential Elements of Information
    3. Specific Information Requirements
    4. Indicators
    5. The Overall IR Process Flow
  5. Targeting – Intelligence Collection
  6. Information Required Prior to Intelligence Requirements
  7. Prioritization
    1. What is an Intelligence Requirement
    2. What is a Priority Intelligence Requirement
    3. Prioritization continued
  8. Collector/Analyst Need to Understand
  9. Stakeholder knowledge of their systems and data
  10. Intelligence Team Priority Intelligence Requirements Examples
  11. Get them to requirements
  12. Exercise Review
  13. Wrap-up and Q&A

Cyber Threat Intelligence – STEMPLES Plus – Indicators of Change – Hofstede Principles

On Demand Webinar Registration

  1. STEMPLES Plus – Strategic Analysis
  2. The Six Categories – ASCOPE
    1. Area
    2. Structures
    3. Capabilities
    4. Organizations
    5. People
    6. Events
  3. D3A Targeting F3EAD
  4. STEMPLES Plus
    1. Social
    2. Technical
    3. Economic
    4. Military
    5. Political
    6. Legal/Legislative
    7. Educational
    8. Security
    9. PLUS
      1. Religion
      2. Demographics
      3. Linguistics
  1. Psychological
  2. Other
  3. Indicators of change
    1. Motive thru Capabilities
    2. Levels of Concern
    3. Example
  4. Hofstede Principles
    1. Power and Distance
    2. Individualism and Collectivism
    3. Masculinity and Femininity
    4. Uncertainty Avoidance
    5. Long Term and Short Term
    6. Indulgence and Restraint
    7. Hofstede Country Comparison Exercise
  5. Wrap up and Q&A

Cyber Threat Intelligence – Collection Management

On Demand Webinar Registration

  1. Definition
  2. Requirements Management
  3. Mission Management
    1. Mission Analysis
    2. Gaps
  4. Collection Planning
    1. Simplified Process
  5. Collection Strategy
    1. Intelligence Collection Synchronization
  6. Collection Operations
    1. Principles
  7. Collection Manager Tasks
    1. Bringing in Intelligence Requirements
    2. A Multidisciplinary Approach
    3. Available Assets
  8. Request for Information
    1. RFI Template
  9. Complete a Plan
    1. The Collection Plan Templates
    2. Breakdown of the template
    3. Collection Manager Tasks Redux
    4. Example completed plan
  10. Iterative feedback – Constant communication
  11. Wrap up and Q&A

Contact Treadstone 71

Please note that only corporate email domains are allowed. Gmail, Hotmail, Yahoo, etc will be rejected.

Please type your full name.

Invalid Input

Invalid Input

Invalid email address.

Please tell us your area of interest.

Invalid Input

Treadstone 71 offers an affiliate program for known entities who wish to resell our training, both online and in-person. The affiliate program offers percentage commissions that grow based on numbers of registered students. We offer tiered programs that reward the aggressive affiliate.

We also offer white label and partnership programs for organizations that wish to resell our services and partner with our consulting. We offer tiers of commissions based on numbers. The more you sell, the more we both earn. 

Have an idea of how to work with us? Send it along!

To learn more:

Please complete this short form and your data sheet will be emailed to you. All fields are required. Corporate email accounts only - no Gmail, Yahoo, or other free mail accounts accepted.
Please enter your name.

Please enter your title.

Please enter your company.

Please enter a valid email address.

Invalid Input

Details of the RFI Form

Request for Information (RFI) – Cyber Threat Intelligence

The RFI process includes any specific time-sensitive ad hoc requirement for intelligence information or products to support an ongoing event or incident not necessarily related to standing requirements or scheduled intelligence production.

When the Cyber Threat Intelligence Center (CTIC) submits an RFI to internal groups, there is a series of standard requirements for the context and quality of the data requested.

RFI Form

Learn more about the complete Cyber Threat Intelligence online knowledgebase - CyberIntellipedia

  • The data is expected to be curated.
    • Data curation is the organization and integration of data collected from various sources. It involves annotation, publication, and presentation of the data such that the value of the data is maintained over time, and the data remains available for reuse and preservation
  • The data is expected to have been reviewed and validated.
    • Data needs to be cited providing sources to the data (APA format per Microsoft Word).
    • Data should be evaluated for the credibility of the sources and validation of the data (see Appendix A)
  • The data follows the below format each time to speed cycle time. This format should be congruent with the incident response platform in use.
  • Standards must be used such as those associated with NIST or other accepted standards as agreed upon for use within your organization.
  • The data should be formatted to fit your internal processes and procedures. You may wish to consider how you apply the Diamond, Kill chain, and ATT&CK models using standard data fields.
  • The data should be easy to extract, repeatable, and when applicable, quantifiable (cardinal number).
  • The data should have a historical record so we can analyze month-to-month patterns, trends, and tendencies.
  • The dates and times of when the data was created (not created by your organization with respect to the event or incident ingestion but action dates and times of event or incident activities.
  • The data should be classified with standard internal classification levels and TLP designators.

Source Credibility Admiralty Scoring

When and where applicable, the data needs to answer the following questions:

  • What exactly is or was the problem or issue?
  • Why is this happening now, who is doing this, what is their intent/motivation?
    • So what - why do we care and what does it mean to us and our clients?
  • Impact so far if any to our data and systems or the data and systems of our clients?
  • What do we expect to happen next? What is the expected outlook for continued actions if any?
  • Supervisory Action (actions to be or that have been taken based upon data/information/analysis)
  • What recommendations were made and what recommendations were executed?
    • What was/were the course(s) of action?
    • What was the result of the implemented recommendations?
  • Were there any unanticipated implications to the recommendations?
  • What opportunities are there for your organization going forward?
    • Did we find any weaknesses?
    • Did we identify any strengths?
  • What gaps were found in our environment (people, process, technology)?

If the data you send does not come curated, reviewed, and validated with proper citations in the requested format, it may not make it to the report.

Source Credibility

We must treat each vendor report and data feed as nothing more than another source of data. Data that must be evaluated for credibility, reliability, and relevance. To do so, we can use the NATO Admiralty Code to help organizations evaluate sources of data and the credibility of the information provided by that source. Evaluate each vendor report using this coding method while documenting ease of data extraction, relevance to your organizational issues, type of intelligence (strategic, operational, tactical, and technical), and value in solving your security problems. Most publications provide the top-level scoring model. We provide the full model for auto-calculation built into the PDF. 

Find the form here

Contact Treadstone 71 Today for all your Cyber Intelligence needs.

CONTACT US TODAY