The course follows the iterative processes of the intelligence lifecycle while covering non-inclusively:
Lecture, Hands-on, Apprenticeship, in-class exercises, student presentations, analytic products, templates, course material—40 CPEs
All Case Studies use all methods, techniques, and tools referenced in the course material. The Case Studies used are straight from the headlines giving students real-world experience during the class.
All students receive 2 books and 50 plus course documents, VPN, team burn phones, and other course materials.
The course runs over five consecutive days covering Monday through the Friday evening 5 PM. Students are expected to attend each hour of each day since the course is comprehensive with each day building upon the next. Days may start at 7:30 AM and may run to 6 PM on Tuesday and Wednesday. Breakfast, lunch, and afternoon snacks/tea are provided. Lunches are usually working lunches. Class minimum is 15 with a maximum of 25.
Students who complete the course will be certified as Cyber Intelligence Tradecraft Professional. 40 CPEs awarded for the course. This course is highly specialized following intelligence community tradecraft. You won’t get this at SANS. You won't get this anywhere but from Treadstone 71. If you want purely technical, then this is not the course for you. If you want tradecraft that lays the foundation for a solid program, education that creates a lasting impact, then this is the course for you.
Course books and manuals will be provided to students upon accepted enrollment. This course follows the traditional intelligence community tradecraft. Treadstone 71 has been teaching cyber intelligence courses in various forms for six years. From academic settings and corporate environments to government facilities. Our customers include some of the largest firms in the world many of whom are part of critical infrastructures recognizing the need to learn how to create intelligence. We support our training with onsite consulting services that teach you how to create a sustainable program aligned to stakeholders. Ultimately, we teach you what most vendors cannot or will not – how to fish for yourself.
Use our contact form to validate course eligibility before registration.
Course Fee, Course Lab, and Materials Fee (includes books, templates, structured techniques application, etc.).
This course combines lecture, research, and hands-on team assignments. Students need to bring a laptop (PC or MAC) that does not have corporate controls (tablets will not suffice).
This course provides definitive sections along the intelligence lifecycle that are in-depth. Students are required to demonstrate understanding and use of collection methods using defined targets and target case studies, understanding and applying analytic techniques, when and how to use analytic techniques and analytic types. Students are presented case studies for analysis, required to use tradecraft methods, and provide written reports in standard analytic format. Students are also required to orally present their deliverables to the class. You will leave this course with the tools, methods, and understanding necessary to enhance your intelligence program.
“The Cyber Intelligence Training delivered and created by Jeff Bardin will add rapid returns to both Cyber Intel Analysts, and your Security Operations. This very thorough class adequately prepares the student for your Cyber Intelligence function. This class starts with the history of intelligence as tradecraft and the evolution of the digital corporate world. Along the way, each student receives quality instruction and hands-on experience with today’s OSINT tools. This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.”
“The class was very detail orientated with a strong focus on the work of Cyber threats and how to better secure your assets against potential attacks. For most scenarios, we went through he had an open source tool, or the link to a paid version, to monitor or prevent the attacks from occurring. He was able to answer each and every question asked with specific details, and then some. I would sign up again right away for any other classes offered by Jeff.”
"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS. SANS does not compare. They are more of a class mill today. The Treadstone 71 course material is unique, focused, and timely."
“The Cyber Intelligence training offered by Treadstone71 is definitely an outstanding course and I recommend it for any organization looking to implement an intelligence capability. Jeff Bardin is extremely knowledgeable in the intelligence tradecraft and applies it to the cyber realm in a way that is understandable, exciting to learn and makes it easy to achieve “quick wins” in the organization after completing his class. Jeff provided the class with a multitude of tools, templates, and documents that can immediately be used by any organization focused on intelligence collection and analysis. Jeff arrived well prepared to teach the course and one of the most impressive aspects of the class was that he presented the material in a way that displayed his personal knowledge and experience in the field rather than relying solely on book material. We intend to continue leveraging Jeff’s services as we mature our cyber intelligence capability and highly recommend Treadstone71’s services to any organization.”
“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”
“This course was excellent. I was concerned coming into it that I would already know all the course material (I have been doing this sort of work for 15 years, specifically the type of work this course covered). As it turns out, it was a good reminder of what I should be doing to improve structure and rigor, and provided good tools, some of which I had not seen before. If I was new to this field, or looking for a good insight into how Intelligence should work (i.e.: most of the rest of the class), I believe this would have provided even more value. I have already recommended it to a couple of my former colleagues in this line of business, and would happily recommend it for future use by ########.”
Breakfast and lunch served daily. Afternoon snack provided
Course material is not for resale or commercial use outside the end user license agreement. Course material may not be used for competitive purposes.
NOTE: Organizations sending 3 or more students are eligible for other discounts. Contact Treadstone 71 here at for more information.
NOTE: CORPORATE PURCHASE ORDERS can be arranged. Please contact us here at to begin the process.
You must attend the full class in order to receive all the course material and the certification. Certification is granted after completion of course instruction and hands-on application of the concepts in 3 to 4 team exercises. If a student leaves the class prior to course completion, neither the certification is granted nor is the course material covered after the student leaves made available. Lectures and associated material is posted each day after each lecture. This method supports the student in a just-in-time manner. This method ensures a full understanding of the material without discovering course plot lines until the proper time. The course is architected to support a particular process flow and learning method.
Laptops without corporate controls required. Personal laptops allowed. Administrative access required. Pre-requisites - Strong understanding of the Internet and web browsers. MAC or PC is fine but PCs preferred. Tablets will not work.
All students need to take the below Myers-Briggs personality test prior to the class. This may be performed here: www.humanmetrics.com/cgi-win/jtypes2.asp
Target audience: CISOs, SOC Managers, Cyber / Information Security VPs, Directors, Analysts, Intelligence analysts, law enforcement, Intelligence Community, and those wishing to learn proper methods of analysis.
No refunds allowed after October 15, 2019 Refunds are minus processing fees. Please read the course end user license agreement:
|Event Date||03-16-2020 7:45 am|
|Event End Date||03-20-2020 5:00 pm|
|Registration Start Date||09-24-2019|
|Cut off date||03-13-2020|