• High Level Benefits of the Cyber Intel Course

    This course examines Sherman Kent's Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services. 


  • The Treadstone 71 Difference

    We are nothing like competitors who are rooted in defensive posture actions with a pedigree in reverse engineering malware and providing defensive solutions for that malware. Most come from anti-virus and law enforcementInterestedinyour success
    backgrounds where 'see, detect, and arrest' is their mantra. They offer technology solutions based upon this method of protection. Although they do provide information on adversaries, the information is based on the technology. Most are VC funded and need to sell product and do so as a lead requirement. Technology is not the solution only a tool. Treadstone 71 is profitable without VC overhead and have only your best interests at hand. We are not an MSSP. Treadstone 71 does not sell product. We are independent of technology companies and not beholden to venture capital overhead. We are not cyber carpetbaggers.

    What Treadstone 71 provides is a full-spectrum solution that takes the information you provide in your SOC and incident response functions combining that with complete political, economic, social, technological, environmental, legislative, industrial, educational, and religious aspects of the adversary as well as adversary dossiers and organizational structures. What you receive from Treadstone 71 is detailed information and intelligence on your adversary that far surpasses the technical realm. Where Treadstone 71 service excels is in the ability to provide you with techniques, methods, capabilities, functions, strategies, and programs to not only build a fully functional intelligence capability, but a sustainable program rooted in stakeholder requirements and needs.  Treadstone 71 is rooted in strong military and intelligence community backgrounds.

    Sample areas of the Treadstone 71 difference: 

    • we help you improve your incident detection, prevention, and response developing feedback to improve your cyber defenses
    • we assist you in using you threat intelligence to help automate security operations and remediation actions enhancing your operational tradecraft
    • we guide you in the building of a centralized threat intelligence service that guides cybersecurity activities of other organizational units
    • we drive efficiencies and effectiveness in risk management
    • we operationalize your threat intelligence from little to no processes to mature procedures, standard operating procedures, and workflows
    • we ensure integration between all things PESTELI +R+E+ and existing technologies in your SOC
    • we ensure you understand how to define credibility and relevance of your threat intelligence feeds that leads to truly actionable intelligence
    • we assist you in understanding your attack surface and online footprint from websites to social media to the darknet creating new opportunities for targeted intelligence collection
    • we help identify, infiltrate, and track adversaries providing information where and when possible to prevent attacks
    • we understand geopolitical factors that helps prepare your cyber environment for current and future contingencies
    • we learn the priorities of your adversaries and help you define a more assertive cyber posture for your organization
    • we tailor strategies and programs based upon your organizational needs and the needs of leadership
    • we teach and embed cyber intelligence tradecraft in your organization that is lasting following structured techniques proven in the intelligence community
    • we educate and drive situational awareness through table top exercises based upon proven military methods adopted for commercial organizations
    • we identify adversary front companies, their means, motives, and targets
    • we look at adversary’s skills, motivation, maliciousness, types of adversaries, level of automation and rate, informational impacts, targets, defensive measures, adversary course(s) of action, operational impact, line of business impact, and attack vectors
    • we create and maintain a presence on their virtual soil using virtual HUMINT methods to help identify your attack surface, your digital footprint
    • we know methods of collection, organization/production, structured analytic techniques, how to determine source credibility, communicate gaps and confidence levels, analyze using standard methods of inference, deductive and inductive reasoning, apply clear process for critical thinking, and deliver product in standard analytic writing methods that is clear and concise
    • we have been penetrating adversary sites, forums and social media since 2004 using both active and passive methods of cyber engagement – we have been in business since 2002
    • we listen


  • Treadstone 71 Head of Threat / Cyber Intelligence Services

    head of threat intel


    Treadstone 71 provides threat intelligence leadership service that is designed to assess and benchmark your organization's cyber intelligence program examining incident response, cybercrime, hunt groups, red/blue/purple teams, threat intelligence, leadership/stakeholder issues and needs, reporting, integration, and communication. The Interim Head of Threat Intelligence Service is customized and scaled based on the size of your organization and industry type. Treadstone 71 provides a structured approach used to measure and develop your intelligence direction.  for organizations using internationally recognized information security standards. 

    NOTE: Sign up for Treadstone 71 Cyber Intelligence Tradecraft Certification training here:

    Part of the Treadstone 71 Force Multiplier Intelligence Advisory Services

Search Our Site

Treadstone 71 - We See What Others Cannot

The Cyber Intelligence Training adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands-on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.  – Antonio 

Fortune 100 Company



ONLINE - Cyber Intelligence Tradecraft Certification - Enroll now for April 28, 2018, start date. 8-week online course.

March 12-16 Cyber Counterintelligence - Reston, VA (Cyber Intel Course Pre-Requisite)
March 19-23 Cyber Intelligence- Columbia, Maryland
April 9-13 Cyber Intelligence- London, UK

April 23-27 Cyber Intelligence - NYC
April 30 – May 3 Cyber Intelligence - Los Angeles California - Burbank
May 14-18 Cyber Intelligence- San Jose, CA
June 18-22 Cyber Intelligence- Annapolis Junction, Maryland
Aug 13-17 Cyber Intelligence- Reston, VA
Sep 17-21 - Cyber Intelligence- Boston, MA
Oct 15-19 Cyber Counter Intelligence - Reston, VA
Nov 5-9 Cyber Intelligence- Denver, CO
Dec 3-7 Cyber Counter Intelligence - Columbia, Maryland


Intelligence Tradecraft - CounterIntelligence - Clandestine Cyber HUMINT  - Cyber Psyops - Persona Creation and Management - Cyber Influence Operations - Middle Eastern Cyber Warfare Tradecraft

Blended courses - Courses on demand - Courses developed per your needs, quietly and quickly

Students and organizations taught (non-inclusively):

AIB, American Express, Capital One, Commonwealth Bank, Bank of America, ING, NCSC NL, Defense Security Services, PNY, Dell Secureworks, HPE Security, EclecticIQ, Darkmatter (AE), General Electric, General Motors, PNC, Sony, Goldman Sachs, NASA, DoD, East West Bank, Naval Air Warfare Center, VISA, USBank, Wyndham Capital, Egyptian Government, DNB Norway, Euroclear, Malaysian Cyberjaya, People's United Bank, Baupost Group, Bank of North Carolina, Fidelity Investments, Citi, Citigroup, T. Rowe Price, Wells Fargo, Discover, Blackknight Financial Services, Intercontinental Exchange (ICE), Citizens Financial Group, Scottrade, MetLife, NY Life, Synchrony Financial, TD Ameritrade, National Reconnaissance Office, FBI, Stellar Solutions, Lockheed Martin, Harvard Pilgrim, State of Florida, Deloitte, Ernst and Young, Mitsubishi, Tower Research, Geller & Company, KeyBank, Fannie Mae, BB&T, Aviation ISAC, JP Morgan Chase, Barclays, Nomura International, ING, Finance CERT Norway, BBVA, Santander, Bank of America, Equifax, BNY Mellon, OCC, Verizon, Vantiv, Bridgewater Associates, Bank of Canada, Credit Suisse, HSBC, International Exchange, Vista Equity Partners, Aetna, Betaalvereniging Nederland, several members of FlashPoint, non-inclusively (as well as several other firms by proxy as they hire qualified intelligence professionals trained by Treadstone 71).

Terms of Use - Privacy Policy - Course EULA



"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely."

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”


Ironically, said Bardin, it was Stuxnet that led Iran to enhance its offensive capability: ‘If Stuxnet had happened to the US or UK, it would have been seen as an act of war. In Iran, it made them invest heavily in offensive cyber operations.’

He revealed that 18 percent of Iranian university students are studying computer science – a cyber warfare talent pool.

Treadstone 71 Interview - Daily Mail on Industrial Control System Hacks







Treadstone 71 Cyber Intelligence Services








Treadstone 71 at Blackhat








Treadstone 71 New Services - Analysis as a Service








Cyber Jihad - 2008-2011 Compilation Part 1








Cyber CoiunterIntelligence Doctrine








Iran Cyber Proxies and Capabilities 








The Irari Report








Gaming as a Method of Jihadist Training








Treadstone 71 Keynote








Treadstone 71 Cyber Intel Services / Training
















Treadstone 71 Secureworld Expo







Treadstone 71 Fox News







Treadstone 71 Hacktivity