Intelligence Community-Driven Content - Free Short Course from Treadstone 71
This free course provides an overview of the Certified Threat Intelligence Analyst online instruction as well as pre-recorded webinars on Stakeholder Management, Adversary Targeting, Intelligence Requirements, STEMPLES Plus, and Collection Management.
The short course provides an overview of:
This is an on-demand course that runs up to 12 weeks.
20% VETERANS DISCOUNT
The online courses are instructor video and audio recorded with periodic direct interaction with the instructor via online web meetings. The instructor will have standard office time for questions and answers as well as regular access via class email and other messaging options.
This course follows (non-inclusively) the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training.
Latest student testimonial:
"With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real-world scenarios establishing a solid understanding of using these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine-tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional."
All students receive 2 books and 50 plus course documents, VPN, and other course material.
This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome.
8 to 12 Weeks - On-Demand - Online
|Cyber Infiltration||Propaganda and Fallacies||Cyber Psychological Operations|
|Information Operations||Media Manipulation||Target analysis and manipulation|
|Standard Glossary and Taxonomy||Charts, Graphs, Generators||Authoring of blogs and articles for influencing|
|Mission-Based Counterintelligence||Deception Planning||Placement of specific concepts and phrases|
|Counter Collection and Anticipation||Deception Chain||Cyber Persona Layer|
|Denial and Deception||Types of Denial and Deception||Cyber Persona Development and Maintenance|
|Counter-Denial and Deception||D&D Usage||Character archetypes|
|Open Source Intelligence in Deception Operations||Perception as Deception||Establish the storyline|
|VPNs and Burn Phones (US Only)||Avoid and Deny||Establish the plot synopsis|
|Methods of Social Media Research||Shifting the Conversation||Story weaving and management|
|Social media demographics||Forum Manipulation - COINTELPRO||Target profiles – dossiers|
|Cyber Target Acquisition and Exploitation||Social Psychology||Target gap analysis|
|Identify Active Adversary Campaigns||Persuasion||Clandestine Collection Operation|
|Intent, Motivation, Goals, & Requirements||Differences in Culture/Diversity||Surveillance and Counter Surveillance|
|Passive data collection||Hofstede Dimensions||CI Insider Threat, Investigations|
|Campaign development||Reciprocity and Consistency||Guide to Underhanded Tactics|
|Vectors of approach||Social validation||Rules for Radicals|
|Courses of action||Liking, Authority, and Scarcity||Case Studies|
|Elicitation and exfiltration||Rules of Disinformation||Team Presentations|
|Memetic Engineering||Information Warfare||Content Creation|
|Operational Security||MORE DETAILS BELOW|
All too often we see organizations receive information on threat actors only to point-and-shoot when it comes to collection. There is little to no structure in this critical task that drives all intelligence production, analysis, and analytic writing.
This course prepares the organization’s designated intelligence professional as the person in charge of managing collection planning, staffing, targeting, ensuring integrated, synchronized, and deconflicted collection actions. As information is received from internal requests for information, analysis of existing data, information, and intelligence on the subject in question, the collection manager correlates and determine gaps in preparing the collection plan. This course prepares students in the development of collection requirements, designed to maximize the effectiveness of your limited resources covering what may seem as vast areas of online targets. The course assists the collection manager in determining where to look when to look, and what to look for. We provide students with situation and event templates, how to fill them out, how to manage the ever-changing problem iteratively, and how to establish collection priorities base on the courses of action the threat actor may likely adopt.
The collection manager works with the intelligence and priority intelligence requirements to develop the collection plan translating these into specific information requirements used to provide targeting while managing the availability and capabilities of the collection/research team.
ONLINE - Cyber Intelligence Tradecraft Certified Threat Intelligence Analyst from Treadstone 71.
Treadstone 71 gives you any time, anywhere access to the most intensive, intelligence community validated training. Our courses follow standards only taught in the US Intelligence Community fully adapted to the cyber environment. Our class have been taught online since 2008 and are taught intelligence community professionals
All Treadstone 71 courses include:
ONLINE - Cyber Intelligence Tradecraft Certified Threat Intelligence Analyst from Treadstone 71.
EARLY BIRD DISCOUNT THROUGH JUNE 5 ($459.00 OFF THE RETAIL PRICE) Enter SIGS-EarlyBird at checkout.
REGISTRATION REQUIREMENT: A VALID COMPANY EMAIL ADDRESS - ANY REGISTRATION OUTSIDE THIS REQUIREMENT WILL BE REJECTED. DO NOT REGISTER WITH GMAIL, HOTMAIL, OUTLOOK, YAHOO, PROTONMAIL, MAIL, TUTANOTA OR ANY TEMPORARY OR NON-GOVERNMENT OR COMPANY EMAIL. COMPANY MUST BE LEGITIMATE. THE ORGANIZATION MUST NOT BE TIED TO AN ADVERSARY GOVERNMENT OR ORGANIZATION.
course follows the iterative processes of the intelligence lifecycle. Strategic analysis requires a breakdown of the complexity’s analysts face during data examination. Keeping the analysis and results relevant is difficult. Analysts need to find ways to organize, rank, and present their findings. Analyst’s always keeping a close eye on what the findings will mean to the stakeholders.
Stakeholders need to understand that analysts always work with incomplete and fragmented data. Adversaries work hard to deny analysts the data. Their methods include various types of deception. This course provides analysts with a framework reducing many of the problems faced with fragmented data.
This course covers the following non-inclusively:
|Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence||Relevant actors and their capabilities|
|Data, Information, Knowledge, and Intelligence||Inference|
|Knowledge Generation||Adversary Courses of Action (CoA)|
|Explicitly versus Tacit Knowledge||CoA advantages and disadvantages|
|Principles of Knowledge Management||Likelihood and probability in Adversary CoA|
|Monitoring your Business Environment||Patterns, Trends, Tendencies|
|Analysis Projects||Estimative Intelligence|
|Analysis Cycle||The Role of Warning Intelligence|
|Briefing||Key Warning Factors in Preparations|
|Collection Planning||What Is Warning?|
|Collecting from Unsuspecting Sources||Indicator Lists: Compiling Indications|
|Collection from Public Domain||Fundamentals of Indications Analysis|
|Collection from Images||Use of Indicator Lists|
|Collection from Things||Extracting Indications Data|
|Collection Outsourcing||Indications Chronology|
|Analysis||Specifics of the Analytical Method|
|Introduction||How Might they Go to Cyber War?|
|Attributes of strategic analysis||Cyber Order of Battle Methods|
|Collector - Analyst Relationship||Analysis of Cyber Mobilization|
|Collector-Analyst Differences||Recognition of Cyber Buildup|
|Corporate Alignment||Preparation for Cyber Warfare|
|Organizing a Strategic Analysis Function||Preoccupation of Leadership / Stakeholders|
|Organizing a solid team||Cyber Readiness|
|Towards a world-class strategic analysis org||Magnitude and Redundancy of Preparations|
|Profile of an analyst||Cyber Wargaming|
|Forecasting||What is a Cyber Wargame|
|Multiple Scenarios Generation||Why run a Cyber Wargame|
|Scenario analysis||Principal Factors in Timing and Surprise|
|Influencers||Examples of Assessing Timing|
|Link Analysis and Centrality||Warning is Not a Forecast of Imminence|
|Estimates for future planning||The Problem of Deception|
|Case Studies and Hands-on|
This course teaches students how to think independently and stay away from the low-level tactical approaches we see in daily reports. Strategic, big-picture reviews and assessments that incorporate the social, technical, economic, military, political, legislative, educational, and security, plus demographics, religion and the psychometric (STEMPLES Plus) aspects of an adversary are lost in today's world of current news posing as intelligence. Lecture, Hands-on, Apprenticeship, in-class exercises, student presentations, analytic products, templates, course material—40 CPEs. Books provided by Treadstone 71 with some required read-ahead activities.