331-999-0071

Upcoming events

21
Apr
2020

Free Cyber Intelligence Short Course - Overview of Training

04-21-2020 2:00 pm - 04-21-2026 3:00 pm
Online
Free
Free Cyber Intelligence Short Course - Overview of Training

Treadstone 71 Training and Webinars

Intelligence Community-Driven Content  - Free Short Course from Treadstone 71

This free course provides an overview of the Certified Threat Intelligence Analyst online instruction as well as pre-recorded webinars on Stakeholder Management, Adversary Targeting, Intelligence Requirements, STEMPLES Plus, and Collection Management.

The short course provides an overview of the below topics with an added webinar on counterintelligence:

  • Treadstone 71 History
  • Training and Webinar Approach
  • Risk versus Intelligence
  • Forecasts - Estimates
  • Cyber Intelligence Lifecycle
  • Intelligence COmmunity Taxonomy
  • Areas of Intelligence
  • OPSEC - Data Provenance - Source Validation-Evidence Credibility
  • Stakeholder Management
  • Adversary Targeting
  • STEMPLES Plus - Indicators of Change
  • Intelligence Requirements
  • Logical Adversaries
  • Threat Matrices
  • Collection Plans - Request for Information
  • Structured Analytic Techniques
  • Analysis of Competing Hypotheses
  • Critical Thinking
  • Cognitive Bias
  • Types of Analysis - Reasoning Methods - Synthesis
  • Production - Analysis - Interpretation - Intuition - ATT&CK
  • Analytic Writing
  • Briefs and Reports
  • Argument Mapping

See our Summer and Fall of Cyber 2021 Courses - In-Person - Fort Myers, Florida July 17-August 6 /// September 20-October 8 - December 13-17, 2021 and January 10-14, 2022

04
May
2020

ON DEMAND BUNDLE - Certified Threat Intelligence Analyst Plus 6

05-04-2020 - 09-03-2024
Online
SALE! October 1-31, 2021 - $3,900.00

October 2021 Sale - Course discounted to $3900.00 per student with even deeper group discounts.

The online courses are instructor video and audio recorded with periodic direct interaction with the instructor via online web meetings. The instructor will have standard office time for questions and answers as well as regular access via class email and other messaging options.

Validated and registered students will receive login and preparation information 1 week prior to class start. Prospective students must send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. from a corporate account to validate course eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors.

This course follows (non-inclusively) the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training.

  • Introduction to Intelligence
  • Critical Thinking
  • Analytic Writing
  • Creative Thinking
  • Analytic Briefing
  • Structured Analytic Techniques.
  • Analytic Issues
  • Argument Mapping
  • Case Studies

Latest student testimonial: 

"With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real-world scenarios establishing a solid understanding of using these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine-tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional."

  • Anonymity and Passive Persona setup
  • Collection Methods and Techniques - WITH AN ADDED LECTURE ON COLLECTION MANAGEMENT
  • Collection Planning, IRs/PIRs/EEIs/Indicators/SIRs WITH AN ADDED LECTURE ON INTELLIGENCE REQUIREMENTS
  • Collection Process Flow
  • Collection (OSINT) Tools and Targeting
  • Threat Intelligence WITH AN ADDED LECTURE ON ADVERSARY TARGETING (D3A AND F3EAD) AND THREAT MATRICES
  • Most likely Threat Actors
  • Hunch.ly
  • Use of Maltego – overview
  • OPSEC – VPNs, Buscador, Authentic8 Silo - WITH AN EXTENDED OPSEC LECTURE
  • OSINT Browser – Oryon C Portable
  • Proxy Access – the DarkNet
  • Burn phone set up and use (US Only)
  • Open Source Intelligence OSINT
  • Production Methods
  • Structured Analytic Techniques – Their use
  • Adversary Denial and Deception
  • Source Credibility and Relevance
  • Source Validation
  • Denial and Deception
  • Confidence Levels
  • Types of evidence
  • Production Management
  • Critical and Creative Thinking
  • Cognitive Bias
  • Glossary and Taxonomy
  • What Intelligence Can and Cannot Do
  • Use of Mitre ATT&CK in Analysis
  • ATT&CK in examining patterns and trends
  • ATT&CK in Adversary tendencies
  • Estimation and Forecasting
  • Campaign analysis
  • Types and Methods of Analysis
  • Synthesis and Fusion
  • Analysis of Competing Hypothesis
  • Inductive/Abductive/Deductive Reasoning
  • Stakeholder Identification, and Analysis WITH AN ADDED LECTURE ON STAKEHOLDER MANAGEMENT
  • Analytic Writing, BLUF, AIMS
  • Forecasting in your writing
  • STEMPLES Plus, Indicators of Change WITH AN ADDED LECTURE ON STEMPLES Plus, Indicators of Change and Hofstede Principles
  • Argument Mapping
  • Types of Reports
  • Product Line Mapping
  • Report Serialization, and Dissemination
  • Live Case Studies – Class briefs
  • All Case Studies use all methods, techniques, and tools referenced in the course material. The Case Studies used are straight from the headlines giving students real world experience during the class.

All students receive 2 books and 50 plus course documents, VPN, and other course material.

05
Jan
2021

Online Cyber Intelligence Tradecraft - Certified Threat Intelligence Analyst

01-05-2021 1:00 am - 12-14-2027 1:00 am
Online
SALE - October 1 - 31, 2021

October 2021 Sale - Course discounted to $3700.00 per student with even deeper group discounts.

ONLINE - Cyber Intelligence Tradecraft Certified Threat Intelligence Analyst from Treadstone 71.

Registration starts runs periodically as defined on the main Cyber Intelligence Training Center registration page.The online courses are instructor video and audio recorded with periodic direct interaction with the instructor via online web meetings. The instructor will have standard office time for question and answer as well as regular access via class email and other messaging options.

Validated and registered students will receive login and preparation information 1 week prior to class start. Prospective students must send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. from a corporate account to validate course eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors.

The course delivers pragmatic and practical examples for attendees immediate use upon return to their organizations:

  • Use language that is recognized across the intelligence assessment community.
  • Assist stakeholders with intelligence requirements
    • Understand what Intelligence is and is not
  • Create useful intelligence requirements
  • Develop collection plans with precise targeting and tool selection
  • Provide evaluation and feedback necessary for improving intelligence production, intelligence reporting, collection requirements, and operations
  • Skill in using multiple analytic tools, databases, and techniques such as divergent/convergent thinking, ACH, SATS, etc.)
    • Skill in applying various analytical methods, tools, and techniques (e.g., competing hypotheses; chain of reasoning; scenario methods; denial and deception detection; high impact-low probability; network/association or link analysis; Bayesian, Delphi, and Pattern analyses)
  • Knowledge of how to evaluate, analyze, and synthesize large quantities of data (which may be fragmented and contradictory) into high quality, fused intelligence products
  • Execute safe collection in any environment
  • Ensure data provenance during collection
  • How to validate sources and data credibility
  • Provide subject matter expertise in developing cyber operations indicators
  • Consider efficiency and effectiveness of collection resources when applied against priority information requirements
  • Facilitate continuously updated intelligence, surveillance, and visualization input for stakeholders
  • Skill in identifying cyber threats which may jeopardize organization and supply chain interests
  • Identify collection gaps and potential collection strategies against targets
  • Knowledge of denial and deception techniques
  • Knowledge of intelligence analytic reporting principles, methods, and templates.
  • Ability to recognize and mitigate cognitive biases which may affect analysis
  • Ability to clearly articulate intelligence requirements into well-formulated research questions and requests for information
  • Ability to communicate complex information, concepts, or ideas in a confident and well-organized manner
  • Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists

Target audience (who should attend):

This course is intended for

-Intelligence analysts, open-source intelligence collectors, researchers, cyber risk management professionals, incident response leadership, security operations leadership, CISO, CIO, students, cybercrime investigators, analytic report writers, recipients of internal and external intelligence (critical), curious professionals wishing to learn cyber intelligence tradecraft and intelligence strategies.

Requirements (knowledge pre-requisites)

Students should

-be familiar with Internet browsers, Office 365, general intelligence concepts

Hardware/Software Requirements

Students should have

-Laptop with administrative access, 8GB RAM, 100GB free hard drive space, Windows operating system works best but Mac with a VM for Windows works as well.

05
Jan
2021

Online On Demand Analytic Writing (Reports and Briefs)

01-05-2021 1:00 am - 12-14-2027 1:00 am
Online
$899.00

Analytic Writing

The Treadstone 71 Analytic Writing, Reporting, and Dissemination course cover intensive writing training, exercises, the peer review process, briefings and reviews, report types, and dissemination techniques. We follow the intelligence community and proven academic methods validated and verified through years of execution. The course covers non-inclusively:

Analytic Writing, Reports, and Briefs

  • How to write effective intelligence reports
    • Templates, Case Studies, Assignments
    • Editing methods
    • Clarity and concise writing
    • Rules for Effective Writing
    • Tools to assist in simplifying your writing
  • Intelligence Community Directives
  • Professional Development Framework - UK
  • Analytic Writing Standards - Writing Products - Methods to Write Right
  • AIMS BLUF and the Analytic Line of March - Analytic Progression
  • The Writers Rubric - Peer Review
  • Confidence Levels
  • Likelihood and Probability
  • Report Types and Templates
  • Product Line Mapping - Examples
  • Briefings
  • Presentational Methods
  • Feedback Loop

05
Jan
2021

Online Certified Cyber CounterIntelligence Analyst - Influence Operations

01-05-2021 1:00 am - 12-14-2027 1:00 am
Online
SALE! Oct 1-31, 2021
Online Certified Cyber CounterIntelligence Analyst - Influence Operations

October 2021 Sale - Course discounted to $3700.00 per student with even deeper group discounts.

ONLINE - Cyber CounterIntelligence Tradecraft (Influence Operations) Certified Threat Intelligence Analyst from Treadstone 71.

Registration runs on-demand as defined on the main Cyber Intelligence Training Center registration page. The online courses are instructor video and audio recorded with periodic direct interaction with the instructor via online web meetings. The instructor will have standard office time for question and answer as well as regular access via class email and other messaging options.

Validated and registered students will receive login and preparation information 1 week prior to class start. Prospective students must send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. from a corporate account to validate course eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors.

Cyber Infiltration Propaganda and Fallacies Cyber Psychological Operations
Information Operations Media Manipulation Target analysis and manipulation
Standard Glossary and Taxonomy Charts, Graphs, Generators Authoring of blogs and articles for influencing
Mission-Based Counterintelligence Deception Planning Placement of specific concepts and phrases
Counter Collection and Anticipation Deception Chain Cyber Persona Layer
Denial and Deception Types of Denial and Deception Cyber Persona Development and Maintenance
Counter-Denial and Deception D&D Usage Character archetypes
Open Source Intelligence in Deception Operations Perception as Deception Establish the storyline
VPNs and Burn Phones (US Only) Avoid and Deny Establish the plot synopsis
Methods of Social Media Research Shifting the Conversation Story weaving and management
Social media demographics Forum Manipulation - COINTELPRO Target profiles – dossiers
Cyber Target Acquisition and Exploitation Social Psychology Target gap analysis
Identify Active Adversary Campaigns Persuasion Clandestine Collection Operation
Intent, Motivation, Goals, & Requirements Differences in Culture/Diversity Surveillance and Counter Surveillance
Passive data collection Hofstede Dimensions CI Insider Threat, Investigations
Campaign development Reciprocity and Consistency Guide to Underhanded Tactics
Vectors of approach Social validation Rules for Radicals
Courses of action Liking, Authority, and Scarcity Case Studies
Elicitation and exfiltration Rules of Disinformation Team Presentations
Memetic Engineering Information Warfare Content Creation
Operational Security MORE DETAILS BELOW

This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome.

03
May
2021

Online On-Demand Critical Thinking and Cognitive Bias

05-03-2021 - 05-07-2027
Online
$899.00

Analysts and analysts alone create intelligence. Although technological marvels assist analysts by cataloging and presenting data, information, and evidence in new ways, they do not do analysis. To be most effective, analysts need an overarching, reflective framework to add structured reasoning to sound, intuitive thinking. “Critical thinking” provides such a framework and goes further, positively influencing the entire intelligence analysis process. Analysts who adopt critical thinking stand to improve their analyses. This paper defines critical thinking in the context of intelligence analysis, explains how it influences the entire intelligence process, explores how it toughens the art of intelligence analysis, suggests how it may be taught, and deduces how analysts can be persuaded to adopt this habit.

Do you know your biases? Do you know those of your teammates? Does bias show up in your analysis and writing?

A cognitive bias is a systematic pattern of deviation from norm or rationality in judgment. Individuals create their own "subjective reality" from their perception of the input. An individual's construction of reality, not the objective input, may dictate their behavior in the world. Thus, cognitive biases may sometimes lead to perceptual distortion, inaccurate judgment, illogical interpretation, or what is broadly called irrationality.

This course, created in 2008, continues to morph and update cyber intelligence changes. Learning critical thinking and cognitive bias must be a part of your cyber threat intelligence program. These are perishable skills. Get with the program here.

04
Oct
2021

Structured Analytic Techniques

10-04-2021 11:20 am - 10-03-2026 11:20 am
Online
USD899.00

This course takes from the best of the intelligence community, academia, years of hands-on activities to move your cyber threat intelligence program to a sustainable model adding real value to all stakeholders. We set students up for success building a model that moves cyber threat intelligence functions to the role of trusted advisor assisting in business decision-making. The course not only educates the student but prepares the student to educate leadership, integrate it into corporate business processes while delivering timely intelligence. We help students get to the point where they really understand the challenges of corporate decision-makers using inside and outside sources.

The course is timely, contextually needed, and moves the market while establishing the cyber threat intelligence analyst as a true discipline greatly needed in all corporate environments.

Analysis, as practiced in the intelligence, law enforcement, and business communities, is steadily evolving from a mental activity done predominantly by a sole analyst to a collaborative team or group activity. The driving forces behind this transition include the following: The growing complexity of international issues and the consequent requirement for multidisciplinary input to most analytic products. The need to share more information quickly across organizational boundaries. The dispersion of expertise, especially as the boundaries between analysts, collectors, operators, and stakeholders become blurred. The need to identify and evaluate the validity of alternative mental models. The need to counter the use of social media to distribute Digital Disinformation or fake news.

18
Oct
2021

Brussels - Cyber Intelligence Tradecraft - Certified Threat Intelligence Analyst

10-18-2021 1:00 am - 10-22-2021 1:00 am
$3,700.00

BRUSSELS BELGIUM

Cyber Intelligence Tradecraft Certified Threat Intelligence Analyst from Treadstone 71

ACT NOW FOR DEEP DISCOUNTS!

Normal Retail Price: $5899.00

The Certified Threat Intelligence Analyst - Cyber Intelligence Tradecraft training course follows the iterative processes of the intelligence lifecycle while covering non-inclusively. This course follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training incorporating intelligence community member validated content and hands-on experience in the cyber environment since 2004.

I. Introduction to Intelligence
II. Critical Thinking
III. Analytic Writing
IV. Creative Thinking
V. Analytic Briefing
VI. Structured Analytic Techniques.
VII. Analytic Issues
VIII. Argument Mapping
IX. Case Studies

This course is unique and innovative providing students with academic understanding, live case studies, and a course that drives practical over memorization for a test. 

The course is likened to an apprenticeship during an intensive 5-day training course covering the intelligence lifecycle.

Latest student testimonial: 
"With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state-of-the-art concepts and applied them to real-world scenarios establishing a solid understanding of utilizing these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine-tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional."

Lecture, Hands-on, Apprenticeship, in-class exercises, student presentations covering structured analytic techniques, analysis of competing hypotheses, analytic writing and deliver, analytic products, templates, course material—40 CPEs

We are no longer accepting registration for this event

01
Nov
2021

Amsterdam - Cyber Intelligence Tradecraft - Certified Threat Intelligence Analyst

11-01-2021 1:00 am - 11-05-2021 1:00 am
$3,700.00

Amsterdam, Netherlands

Cyber Intelligence Tradecraft Certified Threat Intelligence Analyst from Treadstone 71

ACT NOW FOR DEEP DISCOUNTS!

Exact location in Amsterdam in the works!

Normal Retail Price: $5899.00

The Certified Threat Intelligence Analyst - Cyber Intelligence Tradecraft training course follows the iterative processes of the intelligence lifecycle while covering non-inclusively. This course follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training incorporating intelligence community member validated content and hands-on experience in the cyber environment since 2004.

I. Introduction to Intelligence
II. Critical Thinking
III. Analytic Writing
IV. Creative Thinking
V. Analytic Briefing
VI. Structured Analytic Techniques.
VII. Analytic Issues
VIII. Argument Mapping
IX. Case Studies

This course is unique and innovative providing students with academic understanding, live case studies, and a course that drives practical over memorization for a test. 

The course is likened to an apprenticeship during an intensive 5-day training course covering the intelligence lifecycle.

Latest student testimonial: 
"With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state-of-the-art concepts and applied them to real-world scenarios establishing a solid understanding of utilizing these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine-tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional."

Lecture, Hands-on, Apprenticeship, in-class exercises, student presentations covering structured analytic techniques, analysis of competing hypotheses, analytic writing and deliver, analytic products, templates, course material—40 CPEs

Target audience (who should attend):

This course is intended for

-Intelligence analysts, open-source intelligence collectors, researchers, cyber risk management professionals, incident response leadership, security operations leadership, CISO, CIO, students, cybercrime investigators, analytic report writers, recipients of internal and external intelligence (critical), curious professionals wishing to learn cyber intelligence tradecraft and intelligence strategies.

Requirements (knowledge pre-requisites)

Students should

-be familiar with Internet browsers, Office 365, general intelligence concepts

Hardware/Software Requirements

Students should have

-Laptop with administrative access, 8GB RAM, 100GB free hard drive space, Windows operating system works best but Mac with a VM for Windows works as well.

08
Nov
2021

Certified Cyber CounterIntelligence Analyst - Influence Operations - Amsterdam

11-08-2021 12:00 pm - 11-12-2021 12:00 pm
$3,700.00
Certified Cyber CounterIntelligence Analyst - Influence Operations  - Amsterdam

Amsterdam near Schiphol Airport

Normal Retail Price: $5299.00 - Fall Discount to $3700 per student. Buy two seats get the third free.

Cyber Infiltration Propaganda and Fallacies Cyber Psychological Operations
Information Operations Media Manipulation Target analysis and manipulation
Standard Glossary and Taxonomy Charts, Graphs, Generators Authoring of blogs and articles for influencing
Mission-Based Counterintelligence Deception Planning Placement of specific concepts and phrases
Counter Collection and Anticipation Deception Chain Cyber Persona Layer
Denial and Deception Types of Denial and Deception Cyber Persona Development and Maintenance
Counter-Denial and Deception D&D Usage Character archetypes
Open Source Intelligence in Deception Operations Perception as Deception Establish the storyline
VPNs and Burn Phones (US Only) Avoid and Deny Establish the plot synopsis
Methods of Social Media Research Shifting the Conversation Story weaving and management
Social media demographics Forum Manipulation - COINTELPRO Target profiles – dossiers
Cyber Target Acquisition and Exploitation Social Psychology Target gap analysis
Identify Active Adversary Campaigns Persuasion Clandestine Collection Operation
Intent, Motivation, Goals, & Requirements Differences in Culture/Diversity Surveillance and Counter Surveillance
Passive data collection Hofstede Dimensions CI Insider Threat, Investigations
Campaign development Reciprocity and Consistency Guide to Underhanded Tactics
Vectors of approach Social validation Rules for Radicals
Courses of action Liking, Authority, and Scarcity Case Studies
Elicitation and exfiltration Rules of Disinformation Team Presentations
Memetic Engineering Information Warfare Content Creation
Operational Security MORE DETAILS BELOW

This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome.

Contact Treadstone 71 Today for all your Cyber Intelligence needs.

CONTACT US TODAY