Treadstone 71 Training - 2018 Courses
- Published: Tuesday, 27 December 2016 16:28
ONLINE and CLASSROOM OPTIONS
Online sign up coming soon (www.planetreg.com/T71inteltraining)
The Treadstone 71 Cyber Intelligence, Threat Intelligence, Cyber CounterIntelligence training courses follow standard intelligence community lifecycle including collection methods, techniques, planning, PIRs, and collection tools and targeting with a focus on intelligence analysis. Intelligence production methods and process flows are covered as well as evidence credibility, reliability, denial and deception, and confidence levels. Students are required to demonstrate understanding and use structured analytic techniques as well as various types of analysis including synthesis and fusion of data and information into actionable intelligence. Learn the tradecraft taught in the US Intelligence Community.
What is the difference between Treadstone 71 Classes and SANS?
Treadstone 71 courses are the source of many Cyber and Cyber Threat Intelligence courses. By that, we mean many of the ideas, course flow and sometimes, even material came from the Treadstone 71 created courses at Utica College. The SANS course is no different. At least 1 student from Utica College used Treadstone 71 material from courses there to help create the SANS course. The major difference is that the source's background is purely cyber command driven at a technical level focused on see, detect, and arrest methods of after-the-fact security. In addition, the SANS course does not prepare the student beyond Security Operations, Incident Response, and Forensics. The Treadstone 71 courses are rooted in Intelligence Community Tradecraft as validated by current and former members of the IC. Treadstone 71 instruction incorporates the technical with the tactical, operational, and strategic intelligence functions and methods need to not only build an effective program but execute to stakeholder demands beyond hunt and detect. Treadstone 71 sees hunt and detect as a requirement for organizations but only a piece of the puzzle needed for establishing the solid foundation need for an efficient cyber and threat intelligence program.
Courses from Treadstone 71 provide foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. By starting with traditional counterintelligence and progressing to cyber counterintelligence, the student will develop an appreciation for collection efforts, exploitation of potential threats, insider concerns, and the risks and benefits of counterintelligence. The Treadstone 71 courses provide foundational support to business intelligence, competitive intelligence, and behavior analysis functions.
Organizations use our training materials to build cyber operations and intelligence collection capabilities. The cyber threat intelligence training is unique following CIA tradecraft as created by Sherman Kent and Richards Heuer. From the initial cyber intelligence tradecraft course through to clandestine cyber HUMINT, the Treadstone 71 threat intelligence training is an apprenticeship to building a reliable, sustainable, and resilient intelligence and intelligence analysis, analytic writing and dissemination program that delivers what stakeholders require.
Courses educate students on how to install and use, Tor, Tails, Maltego, Oryon, and I2P non-inclusively. Students will learn how to install and use these tools from flash drives meant to assist in anonymous methods.
Courses follow the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training. We are not a diploma mill aka SANs, Sans Institute. Each course is carefully crafted and updated periodically based upon standards, environmental changes, student input, and actual execution. Organizations come to Treadstone 71 for corporate intelligence, business intelligence, and competitive intelligence needs as well, of course, threat intelligence. Since 2004, Treadstone 71 has practiced intelligence tradecraft in adversary sites. We share that experience including how not to make the same mistakes we learned from with each class.
Courses include case studies covering adversary campaign research and analysis, historical trending, and passive adversary collection. Students will be instructed in applying analytic techniques, when and how to use analytic techniques and analytic types. Students are presented several case studies for analysis, required to use tradecraft methods, and provide written reports in standard analytic format will dissemination the reports to stakeholders.
More courses to come including 2-day courses in Critical Thinking, Structured Analytic Techniques, Analytic Writing, and Dissemination. We offer courses in Palo Alto, Chantilly, Denver, Amsterdam, and London as well as at your organizational offices as required.
Course customization and new course development is only an email or phone call away. Come to train with Treadstone 71. Cyber Intelligence,
More courses to come including 2-day courses in Critical Thinking, Structured Analytic Techniques, Analytic Writing, and Dissemination. We offer courses in Los Angeles, Las Vegas, Chantilly, Reston, Herndon, Columbia, Denver, Amsterdam, Singapore, and London as well as at your organizational offices as required. Course customization and new course development is only an email or phone call away. Come to train with Treadstone 71. Cyber Intelligence,