• Seeing is not always believing
    Seeing is not always believing
  • Cyber Intelligence Maturity
    Cyber Intelligence Maturity Cyber Intelligence Maturity Management Cyber Intelligence Common Body of Knowledge
  • Information Sharing through your own ISAC
    Information Sharing through your own ISAC
  • Maskirovka - Non-Linear Warfare
    Maskirovka - Non-Linear Warfare Cyber Maskirovka - Non-Linear Warfare
  • Middle Eastern Cyber Warfare Assessments - Analysis
    Middle Eastern Cyber Warfare Assessments - Analysis Middle Eastern Cyber Warfare Doctrine
  • Cyber Influence Operations
    Cyber Influence Operations Treadstone 71 Cyber Counterintelligence and Clandestine Cyber HUMINT
  • To win at non-linear warfare you must first understand what it is
    To win at non-linear warfare you must first understand what it is
  • Patterns, trends, information inside data, intelligence created to prevent
    Patterns, trends, information inside data, intelligence created to prevent
  • Analysis as a Service - Light the fire for targeted analysis
    Analysis as a Service - Light the fire for targeted analysis
  • High-Value Target - Know Your Customer Risk and Attack Surface Assessment
    High-Value Target - Know Your Customer Risk and Attack Surface Assessment

Treadstone 71 Training - 2018 Courses

ONLINE and CLASSROOM OPTIONS

Online sign up coming soon (www.planetreg.com/T71inteltraining)

The Treadstone 71 Cyber Intelligence, Threat Intelligence, Cyber CounterIntelligence training courses follow standard intelligence community lifecycle including collection methods, techniques, planning, PIRs, and collection tools and targeting with a focus on intelligence analysis. Intelligence production methods and process flows are covered as well as evidence credibility, reliability, denial and deception, and confidence levels. Students are required to demonstrate understanding and use structured analytic techniques as well as various types of analysis including synthesis and fusion of data and information into actionable intelligence. Learn the tradecraft taught in the US Intelligence Community. 

 Sign up for courses here


April 30 – May 3 Cyber Intelligence - Los Angeles California - Burbank
June 18-22 Cyber Intelligence - LondonCyber_Intelligence_-_Singapore_August_2018.pdf
Jul 31-Aug 3 Cyber Intelligence Tradecraft Las Vegas - PRE-BLACKHAT
Aug 13-17 Cyber Intelligence- Reston, VA
Aug 27-31 Cyber Intelligence - Singapore

Sep 17-21 - Cyber Intelligence- Boston, MA
Oct 15-19 Cyber Counter Intelligence - Reston, VA
Nov 5-9 Cyber Intelligence- Denver, CO
Dec 3-7 Cyber Counter Intelligence - Columbia, Maryland

What is the difference between Treadstone 71 Classes and SANS?

Treadstone 71 courses are the source of many Cyber and Cyber Threat Intelligence courses. By that, we mean many of the ideas, course flow and sometimes, even material came from the Treadstone 71 created courses at Utica College. The SANS course is no different. At least 1 student from Utica College used Treadstone 71 material from courses there to help create the SANS course. The major difference is that the source's background is purely cyber command driven at a technical level focused on see, detect, and arrest methods of after-the-fact security. In addition, the SANS course does not prepare the student beyond Security Operations, Incident Response, and Forensics. The Treadstone 71 courses are rooted in Intelligence Community Tradecraft as validated by current and former members of the IC. Treadstone 71 instruction incorporates the technical with the tactical, operational, and strategic intelligence functions and methods need to not only build an effective program, but execute to stakeholder demands beyond hunt and detect. Treadstone 71 sees hunt and detect as a requirement for organizations but only a piece of the puzzle needed for establishing the solid foundation need for an efficient cyber and threat intelligence program.

T71eyes

Courses from Treadstone 71 provide foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. By starting with traditional counterintelligence and progressing to cyber counterintelligence, the student will develop an appreciation for collection efforts, exploitation of potential threats, insider concerns, and the risks and benefits of counterintelligence. The Treadstone 71 courses provide foundational support to business intelligence, competitive intelligence, and behavior analysis functions. 

Organizations use our training materials to build cyber operations and intelligence collection capabilities. The cyber threat intelligence training is unique following CIA tradecraft as created by Sherman Kent and Richards Heuer. From the initial cyber intelligence tradecraft course through to clandestine cyber HUMINT, the Treadstone 71 threat intelligence training is an apprenticeship to building a reliable, sustainable, and resilient intelligence and intelligence analysis, analytic writing and dissemination program that delivers what stakeholders require.

Courses educate students on how to install and use, Tor, Tails, Maltego, Oryon, and I2P non-inclusively. Students will learn how to install and use these tools from flash drives meant to assist in anonymous methods.

Courses follow the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training. We are not a diploma mill aka SANs, Sans Institute. Each course is carefully crafted and updated periodically based upon standards, environmental changes, student input, and actual execution. Organizations come to Treadstone 71 for corporate intelligence, business intelligence, and competitive intelligence needs as well of course, threat intelligence. Since 2004, Treadstone 71 has practiced intelligence tradecraft in adversary sites. We share that experience including how not to make the same mistakes we learned from with each class. 

Courses include case studies covering adversary campaign research and analysis, historical trending, and passive adversary collection. Students will be instructed in applying analytic techniques, when and how to use analytic techniques and analytic types. Students are presented several case studies for analysis, required to use tradecraft methods, and provide written reports in standard analytic format will dissemination the reports to stakeholders.

More courses to come include 2-day courses in Critical Thinking, Structured Analytic Techniques, Analytic Writing and Dissemination. We offer courses in Palo Alto, Chantilly, Denver, Amsterdam, and London as well as at your organizational offices as required.

Course customization and new course development is only an email or phone call away. Come to train with Treadstone 71. Cyber Intelligence,

More courses to come include 2-day courses in Critical Thinking, Structured Analytic Techniques, Analytic Writing and Dissemination. We offer courses in Los Angeles, Las Vegas, Chantilly, Reston, Herndon, Columbia, Denver, Amsterdam, Singapore and London as well as at your organizational offices as required. Course customization and new course development is only an email or phone call away. Come to train with Treadstone 71. Cyber Intelligence,

Come to train with Treadstone 71. Cyber Intelligence, Counterintelligence, and Adversary infiltration since 2004. This email address is being protected from spambots. You need JavaScript enabled to view it. 888.714.0071 Treadstone 71 - Training - Cyber Intelligence, Cyber Threat Intelligence Strategic Planning and Program Build, Research and Reporting, Interim CISO and Head of Cyber Intel Functions, Counter Intelligence, Social Networking Collection and Exploitation.

This email address is being protected from spambots. You need JavaScript enabled to view it.

888.714.0071 Office

Search Our Site

Treadstone 71 YouTube Channel 

T71Circle

 

The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio 

Online Cyber Intelligence Training Center for online courses
June 18-22 Cyber Intelligence - London
Jul 31-Aug 3 Cyber Intelligence Tradecraft Las Vegas - PRE-BLACKHAT
Aug 13-17 Cyber Intelligence- Reston, VA
Sep 17-21 - Cyber Intelligence- Boston, MA
Oct 15-19 Cyber Counter Intelligence - Reston, VA
Nov 5-9 Cyber Intelligence- Denver, CO
Dec 3-7 Cyber Counter Intelligence - Columbia, Maryland

Intelligence Tradecraft - CounterIntelligence - Clandestine Cyber HUMINT  - Cyber Psyops - Persona Creation and Management - Cyber Influence Operations - Middle Eastern Cyber Warfare Tradecraft

Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly

Students and organizations taught (non-inclusively): AIB, American Express, Capital One, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, several members of FlashPoint, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA

T71new3

ON THE TREADSTONE 71 CYBER INTELLIGENCE TRADECRAFT TRAINING:

"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely."

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”

T71new4

Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.

Treadstone 71 Interview - Daily Mail on Industrial Control System Hacks

 

 

Treadstone 71 Cyber Intelligence Services

Treadstone 71 at Blackhat

  

Treadstone 71 New Services - Analysis as a Service

Cyber Jihad - 2008-2011 Compilation Part 1

Cyber CoiunterIntelligence Doctrine

Iran Cyber Proxies and Capabilities 

The Irari Report

Gaming as a Method of Jihadist Training

Treadstone 71 Keynote

Treadstone 71 Fox News

Treadstone 71 Hacktivity