Online Cyber Intelligence Tradecraft - Certified Threat Intelligence Analyst

This course follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training.

I. Introduction to Intelligence
II. Critical Thinking
III. Analytic Writing
IV. Creative Thinking
V. Analytic Briefing
VI. Structured Analytic Techniques.
VII. Analytic Issues
VIII. Argument Mapping
IX. Case Studies

Latest student testimonial: 
"With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real world scenarios establishing a solid understanding on utilizing these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional."


Anonymity and Passive Persona setup
Collection Methods and Techniques
Collection Planning, IRs/PIRs/EEIs/Indicators/SIRs
Collection Process Flow
Collection (OSINT) Tools and Targeting
Threat Intelligence
Most likely Threat Actors
Access to ThreatStream during the class
Use of Maltego – overview
OPSEC – VPNs, Buscador, Authentic8 Silo
OSINT Browser – Oryon C Portable
Proxy Access – the DarkNet
Demonstration – Recorded Future / Intel471
Burn phone setup and use (US Only)
Open Source Intelligence OSINT
Production Methods
Structured Analytic Techniques – Their use
Adversary Denial and Deception
Source Credibility and Relevance
Source Validation
Denial and Deception
Confidence Levels
Types of evidence
Production Management
Critical and Creative Thinking
Cognitive Bias
Glossary and Taxonomy
What Intelligence Can and Cannot Do
Use of Mitre ATT&CK in Analysis
ATT&CK in examining patterns and trends
ATT&CK in Adversary tendencies
Estimation and Forecasting
Campaign analysis
Types and Methods of Analysis
Synthesis and Fusion
Analysis of Competing Hypothesis
Inductive/Abductive/Deductive Reasoning
Stakeholder Identification, and Analysis
Analytic Writing, BLUF, AIMS
Forecasting in your writing
Indicators of Change
Argument Mapping
Types of Reports
Product Line Mapping
Report Serialization, and Dissemination
Live Case Studies – Class briefs

All Case Studies use all methods, techniques, and tools referenced in the course material. The Case Studies used are straight from the headlines giving students real world experience during the class.

All students receive 2 books and 50 plus course documents, VPN, and other course material.

Event Properties

Event Date 01-05-2021 1:00 am
Event End Date 12-14-2027 1:00 am
Capacity 10000
Cut off date 01-06-2027
Individual Price SALE - October 1 - 31, 2021
Location Online

Group Rate

#Registrants Rate/Person (USD)
5 3,500.00
10 3,300.00
15 3,200.00
20 3,000.00

Contact Treadstone 71 Today for all your Cyber Intelligence needs.