Treadstone 71 Treadstone 71
  • Treadstone 71 Home
  • About T71
    • Accolades
    • The TreadStone 71 Difference
    • Benefits of Treadstone 71 Training
    • Videos
    • Affiliate Program for Training
    • Strategic Intelligence Analysis - Certification
  • Course Details
    • Building a Cyber Intelligence Program Training Course
    • Structured Analytic Techniques (Online)
    • Intelligence & CounterIntelligence Cyberspace Lifecycle Operations
    • Certified Cyber Intelligence Analyst
    • Cyber CounterIntelligence Tradecraft Certification
    • Training Event Listings
    • Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
    • Analytic Writing (Reports and Briefs) On Demand
    • Cognitive Warfare
  • Training Subscription
  • Intel Services
    • Analysis As a Service
      • Cyber Intelligence RFI
    • Analysis - Reports and Briefs
      • Middle East Cyber Domain - English
      • Middle East Cyber Domain - Arabic
      • Iranian Influence Operations
      • Iranian Link Analysis - Inside the Wire
      • Fallacies in Threat Intelligence - English
      • Fallacies in Threat Intelligence - Arabic
      • Statement of Cyber CounterIntelligence
    • Adversary Baseball Cards
      • Mr. Tekide Baseball Card
    • Cyber and Threat Intelligence Program Build Service
      • Stakeholder Analysis - English
      • Stakeholder Analysis - Arabic
      • What Intelligence Can and Cannot Do
    • Cyber Intelligence Capability Maturity Model Assessments
    • Cyber Threat Intelligence Maturity Assessment, Strategic Planning and Program Build
    • Interim Head of Intelligence
    • Internal Intelligence Communities of Interest
    • Intelligence Requirements
      • Treadstone 71 Priority Intelligence Requirements
    • OPSEC Assessment - Intelligence Preparation of the Cyber Battlefield
    • Targeted Research - Influence Operations
    • Counter and Contain - Influence Operations
    • Threat Intelligence Platform Selection and Rollout
  • Products
    • Conscientia - The Cyber and Threat Intelligence Lifecycle Solution
    • Cyber Intelligence Tradecraft Reference Guides
    • CyberIntellipedia
  • Course Shopping Cart
  • Intelligence - AI - Our Blog
  • Intel Briefs
    • The Evolution of Cognitive Warfare
    • Iranian Intelligence Cognitive Warfare Ops - a Rollup
    • A Shift in Capabilities - Iranian Influence Operations
    • ISIS Organization Chart and Technical Outline
    • Russian Cyber Warfare - The Russian Cyber Army
    • Iranian Influence Operations - Treadstone 71 Intelligence Advisory
    • Hybrid Operations and Cognitive Warfare Actions by Iran Continue Against Opposition Groups
    • Treadstone 71 at RSA Con San Francisco
    • Cyber Intelligence RFI Form
    • Intelligence Games in the Power Grid
    • Bulletproof Vests - Syrian Manufacturing with Russian Assistance
    • Mr.Tekide - APT34 Crypters
    • Chinese Cognitive Warfare Methods
  • Contact Us

331-999-0071

Treadstone 71 Treadstone 71
English English
en Englishar Arabiccs Czechda Danishnl Dutchet Estonianfi Finnishfr Frenchka Georgiande Germanel Greekiw Hebrewhu Hungarianid Indonesianit Italianja Japanesems Malayno Norwegianpl Polishpt Portuguesero Romanianes Spanishsv Swedishth Thaitr Turkishuk Ukrainianvi Vietnameseyi Yiddish
  • Treadstone 71 Home
  • About T71
    • Accolades
    • The TreadStone 71 Difference
    • Benefits of Treadstone 71 Training
    • Videos
    • Affiliate Program for Training
    • Strategic Intelligence Analysis - Certification
  • Course Details
    • Building a Cyber Intelligence Program Training Course
    • Structured Analytic Techniques (Online)
    • Intelligence & CounterIntelligence Cyberspace Lifecycle Operations
    • Certified Cyber Intelligence Analyst
    • Cyber CounterIntelligence Tradecraft Certification
    • Training Event Listings
    • Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
    • Analytic Writing (Reports and Briefs) On Demand
    • Cognitive Warfare
  • Training Subscription
  • Intel Services
    • Analysis As a Service
      • Cyber Intelligence RFI
    • Analysis - Reports and Briefs
      • Middle East Cyber Domain - English
      • Middle East Cyber Domain - Arabic
      • Iranian Influence Operations
      • Iranian Link Analysis - Inside the Wire
      • Fallacies in Threat Intelligence - English
      • Fallacies in Threat Intelligence - Arabic
      • Statement of Cyber CounterIntelligence
    • Adversary Baseball Cards
      • Mr. Tekide Baseball Card
    • Cyber and Threat Intelligence Program Build Service
      • Stakeholder Analysis - English
      • Stakeholder Analysis - Arabic
      • What Intelligence Can and Cannot Do
    • Cyber Intelligence Capability Maturity Model Assessments
    • Cyber Threat Intelligence Maturity Assessment, Strategic Planning and Program Build
    • Interim Head of Intelligence
    • Internal Intelligence Communities of Interest
    • Intelligence Requirements
      • Treadstone 71 Priority Intelligence Requirements
    • OPSEC Assessment - Intelligence Preparation of the Cyber Battlefield
    • Targeted Research - Influence Operations
    • Counter and Contain - Influence Operations
    • Threat Intelligence Platform Selection and Rollout
  • Products
    • Conscientia - The Cyber and Threat Intelligence Lifecycle Solution
    • Cyber Intelligence Tradecraft Reference Guides
    • CyberIntellipedia
  • Course Shopping Cart
  • Intelligence - AI - Our Blog
  • Intel Briefs
    • The Evolution of Cognitive Warfare
    • Iranian Intelligence Cognitive Warfare Ops - a Rollup
    • A Shift in Capabilities - Iranian Influence Operations
    • ISIS Organization Chart and Technical Outline
    • Russian Cyber Warfare - The Russian Cyber Army
    • Iranian Influence Operations - Treadstone 71 Intelligence Advisory
    • Hybrid Operations and Cognitive Warfare Actions by Iran Continue Against Opposition Groups
    • Treadstone 71 at RSA Con San Francisco
    • Cyber Intelligence RFI Form
    • Intelligence Games in the Power Grid
    • Bulletproof Vests - Syrian Manufacturing with Russian Assistance
    • Mr.Tekide - APT34 Crypters
    • Chinese Cognitive Warfare Methods
  • Contact Us

2022 Cyber Intelligence Courses

Online and In-Person

Treadstone 71 at the NATIONAL INITIATIVE FOR CYBERSECURITY CAREERS AND STUDIES

NICCS, NATIONAL INITIATIVE FOR CYBERSECURITY CAREERS AND STUDIES

Treadstone 71

Displaying 1 - 15 of 15 Courses
Course Name Delivery Method
Analytic Writing
  • Online, Instructor-Led
Building a Cyber Intelligence Program
  • Online, Instructor-Led
Certified Cyber CounterIntelligence Analyst - Influence Operations Speciality
  • Online, Instructor-Led
Cognitive Warfare
  • Online, Instructor-Led
Conspiracy Theories
  • Online, Instructor-Led
Critical Thinking and Cognitive Bias
  • Online, Instructor-Led
Cyber Cognitive Warfighter
  • Online, Instructor-Led
Cyber CounterIntelligence Tradecraft - Certified Cyber CounterIntelligence Analyst
  • Online, Instructor-Led
Cyber Intelligence
  • Online, Instructor-Led
Cyber Intelligence Tradecraft - Certified Cyber Intelligence Analyst
  • Online, Instructor-Led
Cyber Intelligence Tradecraft Certification
  • Online, Instructor-Led
Cyber Militias and Foreign Legions
  • Online, Instructor-Led
Disinformation Misinformation, Deception and Narrative Control
  • Online, Instructor-Led
Strategic Analysis - Estimates, Forecasting, and Warning Intelligence
  • Online, Instructor-Led
Structured Analytic Techniques
  • Online, Instructor-Led
 
Sign up at NICCS

Two Years Two Hundred Plus Subscription

Two Hundred for Two Years Only Twenty Available

Subscriptions Two Hundred for Two Years - A subscription to the Treadstone 71 Cyber Intelligence Tradecraft Training Courses at cyberinteltrainingcenter.com gives you access to basic through advanced courses, enough to build a well-skilled cyber intelligence program.

The normal price for one person and all Treadstone 71 courses is about $30,000.00.

REGISTER NOW

The courses are self-paced, video-based, with professor’s office hours, assessed assignments and periodic quizzes. Access courses on any internet-enabled device via PC, MAC, iOS, or Android tablets.

ADD One Seat to CyberIntellipedia for 50% off the normal price when you purchase the subscription. Learn how to build a cyber intelligence program with all the artifacts needed to rapidly execute!

All you need is a set of headphones and a browser, and you are on your way. You may stop and start lectures as you wish from anywhere at any time.

We are only selling twenty (20) subscriptions.

The Two Year Two Hundred subscription maximizes the potential of your existing staff, guides new employees from junior level through senior. These classes include traditional cyber intelligence and counterintelligence tradecraft along with innovative Strategic Intelligence and Cognitive Warfare trainings. We create the glue that ties the physical intelligence world with the virtual.

What you get: 

Instant and unlimited access to the Treadstone 71 course catalog (existing and anything created during the two -year period.

Each course includes:

  • Multiple video lessons (number of lessons varies by course).
  • Supplemental videos and materials, templates, and real-world assignments.
  • Artifacts, documents, readings, and related documents.
  • A Treadstone 71 Reference Guide (see Figure 1 below)
  • Some courses require books delivered by Amazon Kindle to each student.
  • Learning assessments (quizzes) used to evaluate knowledge (we assess course content skill by way of practical exercises as opposed to memorized question and answer tests).
  • Certificates of completion with every completed course, Certifications for Courses named as such with CPE credits.

The courses include:

Use Treadstone 71 as your primary portal for cyber intelligence, counterintelligence, and cognitive warfare trainings.

Who should take the Treadstone 71 trainings?

$99K plus books is a huge savings to organizations that need training for multiple employees in various collection, analysis, and intelligence tradecraft roles.

Positions with titles such as: VP Cybersecurity, CISO, Chief Risk, Information Security Managers, SOC Analysts, Cyber Threat Intelligence Analysts, Operations Analysts, SOC Manager, Chief Security Officer, Head of Cyber Defense, Chief Security Executive, Information Security Analyst, Cyber Security Analyst, Insider Threat Analyst, Cyber Intelligence Analyst, Director Cyber Threat Intelligence, Threat Intelligence Cyber Operations, Cyber Forensics, All Source Intelligence Analyst, Cyber Defense Analyst, Cyber Exploitation Analyst, Cyber Threat/Warning Analyst, Target Network Analyst, Technical Surveillance Countermeasures Analyst, Strategic Intelligence Analyst, Strategic Intelligence Planner, Crime Intelligence Analyst, Open Source Intelligence, Strategy Analyst Intelligence and Foresight, Missions Systems Analyst, Cognitive Warfare Operations, Product Support Hybrid, and Risk Analyst non-inclusively. ________________________________________

Pricing:

  • $99,000 for two years and up to two hundred students may taken any or all Treadstone 71 Intelligence Tradecraft courses.
  • This includes existing, under development, and courses not yet developed.
  • If you signup before the end of 2022, you receive 10% off any payment schedule option.

Payment schedule options:

  • $99,000 up front
  • $50,000 bi-annually
  • $26,000 quarterly
  • $5,000 monthly
  • Required books are extra.

Your subscription activates the day of first purchase. Each course comes with its own z-fold reference guide.

Treadstone 71 Reference Guides

We also have available a choice for organizational management within our portal for student course status reporting, adding, and removing students, tracking quiz grades, and progress reporting.

Treadstone 71 offers customization for courses including adding internal artifacts, policies, procedures, videos, and rules of engagement as examples of tailoring courses to your needs. This takes a bit longer to setup and requires a small setup fee.

Upon enrollment, each student receives login instructions and the best way to use the portal.

Contact us now!

Cognitive Warfare Training - Locations TBD

The new course that centralizes information operations through cognitive methods. We provide hands-on learning and real-world execution using unique techniques taken from both allies and adversaries.

We will cover concepts in Cognitive Warfare, Gray Zone Tactics, Disinformation, Influence Operations, Information Operations, Color Revolutions, Neuro-Linguistic Program, Private Intelligence Firms, Psychological portrait according to the method of 7 radicals and more. We include review of cognitive warfare approaches, a potential framework, historical examples, rational processes, bias in perception and cognition, decision making and time pressures, domains of conflict and combatants, factors influencing decisions, speed and overload, manipulating situational awareness, inducing behavioral change using deception, distraction, distrust, chaos, and confusion. Students learn to assess adversaries for susceptiblity to cogntive weapons and what to observe for potential impacts. Students will learn methods of deception to deceive adversaries, distraction tactics, content creation for distrust, as well as methods of deployment. These methods are included in student created cognitive campaigns that are continuous from multiple vectors. Students will learn cognition of targets while understanding worlds of social media, information, intelligence, and other online vectors. We also cover the issues associated with measuring campaign effectiveness and influence analysis

Validated and registered students will receive login and preparation information 1 week prior to class start.

Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors. This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome

Enrollment Means Training EULA Acceptance – Strictly Enforced

Sign up!
INTELLIGENCE & COUNTERINTELLIGENCE CYBERSPACE LIFECYCLE OPERATIONS FORT MYERS, FL DEC 5-9

INTELLIGENCE AND COUNTERINTELLIGENCE CYBERSPACE LIFECYCLE OPERATIONS DEC 5-8 REGUS, FLORIDA, FORT MYERS - FORUM CORPORATE 9160 FORUM CORPORATE PARKWAY, FT. MYERS, 33905

Training EULA
Learn More!
Intelligence Tradecraft Operator Training - Cyber Cognitive Warfighter

The course covers operational security methods, online anonymity, persona creation and management with Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, the Nine Enneagram Type Descriptions as they relate to personas and cyber HUMINT tactics through campaign development, management, and execution. Additionally, the course includes adversary targeting with cyber D3A/F3EAD and establishing PIRs through the execution of open source and darknet collection. Other material covered: Information warfare, counterintelligence deception methods, conspiracy theories, the use of ‘cyber’ color revolutions, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, setting up and executing cognitive warfare campaigns.




As technology constantly and rapidly changes, so does the way our information is attac alm but in human intelligence gathering, the lengths people will go to obtain information. Treadstone71 Cyber Intelligence training courses allow professionals on all levels, the ability to learn methods, techniques, and tools; to not only collect information, but to recognize and counter the gathering, analytics, and critical thinking skills used in intelligence and denial, and deception. The hands-on case studies, scenarios, and team presentations in our cyber intelligence training courses provide the ability for the extensive comprehension necessary to strengthen both your personal and professional intelligence capabilities.

Register here for online and in-person courses

Conspiracy Theories - Weaponizing Theories to Divide

In a reversal of conventional scientific reasoning, the evidence against conspiracy theories is often construed as evidence for them, because the evidence is interpreted as arising from the conspiracy in question.

Conspiracy Theories are commonplace today. Or more importantly, they were always there but now they have become mainstream.

People – including conspiracy theorists themselves – just write off these beliefs as “crazy.” However, they can potentially cause lasting damage.

The psychology behind conspiracy theories and why people cling to them is so important but often overlooked. We should know how to tackle this, but we do not yet.

Many argue that we were so complacent when it comes to conspiracy theories that it allowed Donald Trump to win support and end up becoming President. We underestimated the influence then, and probably still is now.

Vulnerable people are more likely to believe these theories, so we must ensure we do not downplay influence and we highlight the risks associated with them.

Although the internet has allowed for theories to spread more quickly and more widely, it also allows us to be more critical of what we read and believe.

Conspiracy theories have been around for centuries. In the last few decades, their influence has remained much the same, despite them seeming more widespread.

Training EULA

Learn more
Cyber Militias - Rapid Organizing and Execution Against Nation-State Aggression

This course combines certain aspects of our cyber intelligence, counterintelligence, influence operations, and cyber operations development training. The course follows traditional tradecraft within the intelligence and counterintelligence domains while including near-current influence operations focusing on disinformation with conspiracy theories, and the rapid constitution of hacktivist and proxy cyber operations groups. This is an intense course that covers six days of training and hands-on case studies. We need six days to cover the material, address case study needs, and see a level of results from planning execution. The course works in a live online environment using operational security mechanisms to maintain anonymity. Laptops must have administrative access. Prior to class, an open-source install list is provided to enrolled students. PCs work best or VMs running Windows software.

Some of the areas we cover: 

  • Operational Security – maintaining anonymity online
  • Rapid persona creation for monitoring
  • Cyber Militia RoE -
  • D3A/F3EAD Target acquisition and exploitation 
  • Rapid Training
  • Militia Members Levels of Expertise
  • Point and Shoot
  • Cyber Foreign Legion RoE
  • Socio-cultural / Geopolitical analysis
  • Strategic Dimensions of the Adversary
  • Counter Planning
  • Adversary Targeting Phase - Cyber battlefield(s)
  • Cyber dead drops and covert coms
  • Infiltration and elicitation
  • When you are infiltrated
  • Targeting for trolling
  • Adversary courses of action
  • Adjust your fire
  • A Cyber Foreign Legion
  • Needs – How – Levels of Trust
  • Switch to the alternative ‘frequency’
  • Setting up a crowdsourced-enabled offensive arsenal
  • Weaponizing content 
  • Disinformation
  • Need for Polarization (or not)
  • Control the Narrative / Wag the Dog
  • Adjust and Shift
Learn More
Training Justification Letter
Need to validate training requirements? Try our training jusification letter.
Justification letter

Our course listing (non-inclusive):

Customized training, build-to-order, and targeted adversary training.

  • ANALYTIC WRITING
  • BUILDING A CYBER INTELLIGENCE PROGRAM
  • CERTIFIED CYBER COUNTERINTELLIGENCE ANALYST - INFLUENCE OPERATIONS
  • CERTIFIED CYBER INTELLIGENCE ANALYST
  • COGNITIVE WARFARE INTRODUCTION
    • Aspects of Disinformation
    • Russian Information Alibi
    • Cyber Militias / Cyber Foreign Legions
    • Hybrid Warfare Putin and Ukraine
    • Russian Information Warfare
    • Color Revolutions
    • Chinese Information Warfare
    • Iranian Information Warfare
    • Advanced Topics – Neuro-Linguistic Programming
  • DISINFORMATION, MISINFORMATION, DECEPTION, AND NARRATIVE CONTROL
  • INFORMATION OPERATIONS
  • INTELLIGENCE AND COUNTERINTELLIGENCE - CYBERSPACE LIFECYCLE AND OPERATIONS
  • ONLINE - BASIC CYBER INTELLIGENCE TRADECRAFT
  • ONLINE ADVANCED CYBER INTELLIGENCE TRADECRAFT
  • ONLINE ANALYTIC WRITING (REPORTING AND BRIEFS)
  • ONLINE CERTIFIED CYBER COUNTERINTELLIGENCE ANALYST
  • ONLINE CRITICAL THINKING AND COGNITIVE BIAS FOR CYBER
  • ONLINE ENHANCED CRITICAL THINKING AND COGNITIVE BIAS
  • ONLINE ENHANCED STRUCTURED ANALYTIC TECHNIQUES
  • ONLINE INTERMEDIATE CYBER INTELLIGENCE TRADECRAFT INTELLIGENCE
  • ONLINE STRATEGIC INTELLIGENCE ANALYSIS
  • ONLINE STRATEGIC INTELLIGENCE ANALYSIS PLUS BUILDING AND ENHANCING YOUR CTI PROGRAM
  • ONLINE THREAT HUNTING WITH TAHITI AND MAGMA
  • STRATEGIC INTELLIGENCE ANALYSIS
DMCA.com Protection Status

Contact Treadstone 71 Today. Learn more about our Targeted Adversary Analysis, Cognitive Warfare Training, and Intelligence Tradecraft offerings.

Since 2002  CONTACT US TODAY

: Contact

TreadStone71 Cybersecurity Training and Consulting

This email address is being protected from spambots. You need JavaScript enabled to view it.

331.999.0071 Office
508.519.0363 Fax

: Quick Links

Home
Training
Blog
Terms / Privacy / Training EULA
GDPR Notice

Company
Whitepapers/Briefs
Videos
Contact
Site Map

: Get Social

| | |

Cyber Shafarat
Cyber Reconnaissance
Persian Pasdaran
Voigt Kampff Analyzer
CyberShafarat on Telegram

© 2010, TreadStone71.com.
Custom Joomla Website Design by J2 Studio - Tampa