Cyber and Threat Intelligence Strategic Planning and Program Build
A Facilitated, Mentored Intelligence Program Geared Towards Immediate Success - We teach you how to fish.
Designed to guide your organization to a complete strategy and program in 3 to 4 months.
- goals and objectives creation,
- maturity assessment,
- targeted maturity tracking,
- business justifications
- strategic planning,
- timeline development
- SOP development,
- stakeholder analysis,
- priority intelligence requirements,
- threat matrices,
- strategic analysis,
- OPSEC models,
- rules of engagement,
- persona development and management,
- data provenance models,
- job descriptions,
- competency models,
- process flows
- program measures and metrics,
- table-top exercises
- threat intelligence platform selection,
- collection planning,
- structured analytic techniques,
- threat hunting assessment and standards alignment,
- intelligence analysis,
- analytic writing and
- dissemination non-inclusively
- operational support
- intelligence research
- information sharing
Highlights
- Build a complete program from strategy through collection and analysis
- Cyber Intelligence Tradecraft Training Courses based on intelligence community standards (US and UK)
- The first academically and commercially delivered cyber intelligence training courses on the market since 2008.
- Gain insights into threat intelligence collection methods and focused information requirements
- Rapidly execute stakeholder tasks
- Cyber Intelligence Training and Certification that educates your team as you build the program
Learn, tailor, standardize, execute
Access instructional videos following the intelligence lifecycle with regular ‘instructor office hours. The process follows a standard cycle including comments, suggestions, recommendations, and examples of previously finished products while demonstrating the iterative properties of each lifecycle function.
- Clients move at a regular pace that corresponds with their internal schedules.
The subscription includes the standard Cyber Intelligence Tradecraft Certification training and adds a new module aiding clients with the creation of table-top exercises.
- Clients gain confidence in their capabilities and functions as they carefully follow the training, timelines, and execute the deliverables.
- Clients create and measure against well-defined goals and objectives with specific outcomes.
- Objectives measure against the Treadstone 71 Cyber Intelligence Capability Maturity Model up to 36 months.
- Stakeholder communication strategies ensure continued program status awareness.
- Specific models following community standards drive intelligence reporting.
- Organization staff completes the Treadstone 71 Cyber Intelligence Tradecraft Certification Training to codify the program.
The Treadstone 71 12 Month Cyber Intelligence Training Course as a program may be completed sooner depending on the commitment and pace of those involved.
Please complete the contact form to receive the Data Sheet
The Treadstone 71 Cyber Intelligence Training, Cyber Intelligence Training Courses, Cyber CounterIntelligence Training, Cognitive Warfare Courses are the industry gold standard.
- Treadstone 71 Home
- About T71
- Course Details
- Training Subscription
- Intel Services
- Analysis As a Service
- Analysis - Reports and Briefs
- Admiralty Scoring Model Evidence Verification Automation - AI
- Analyzing Targeted Cyber-HUMINT - A Short How To
- Automating Cyber Intelligence Analysis
- Automating Intelligence Source Verification
- China Cognitive Warfare Methods Brief from Treadstone 71
- Developing Automated Report-Generation Capabilities
- Fallacies in Threat Intelligence - English
- Fallacies in Threat Intelligence - Arabic
- Information diversions from the war on Ukraine
- Iranian Influence Operations
- Iranian Link Analysis - Inside the Wire
- Integrating and automating SATs - Structured Analytic Techniques
- Middle East Cyber Domain - English
- Middle East Cyber Domain - Arabic
- Regularly Evaluate Algorithm Performance for Report Generation and Automation
- Speeding the intelligence analysis peer review process with AI
- Statement of Cyber CounterIntelligence
- STEMPLES Plus as a Framework to Assess Cyber Capabilities
- Adversary Baseball Cards
- Cyber and Threat Intelligence Program Build Service
- Cyber Intelligence Capability Maturity Model Assessments
- Products
- Course Shopping Cart
- Intelligence - AI - Our Blog
- Intel Briefs
- The Evolution of Cognitive Warfare
- Iranian Intelligence Cognitive Warfare Ops - a Rollup
- A Shift in Capabilities - Iranian Influence Operations
- ISIS Organization Chart and Technical Outline
- Russian Cyber Warfare - The Russian Cyber Army
- Iranian Influence Operations - Treadstone 71 Intelligence Advisory
- Hybrid Operations and Cognitive Warfare Actions by Iran Continue Against Opposition Groups
- Treadstone 71 at RSA Con San Francisco
- Cyber Intelligence RFI Form
- Intelligence Games in the Power Grid
- Bulletproof Vests - Syrian Manufacturing with Russian Assistance
- Mr.Tekide - APT34 Crypters
- Chinese Cognitive Warfare Methods
- Imad Mughniyeh - Ghosts of Beirut