Upcoming events


Certifed Cyber CounterIntelligence Analyst

09-27-2021 11:00 am - 10-01-2021 11:00 am
Certifed Cyber CounterIntelligence Analyst

September 27 - October 1 Fort Myers, Florida

Marriott Luminary Hotel

2200 Edwards Drive, Fort Myers, FL 33901

+1 833-918-1512

Normal Retail Price: $5299.00

Early bird registration: $3990.00

Cyber Infiltration Propaganda and Fallacies Cyber Psychological Operations
Information Operations Media Manipulation Target analysis and manipulation
Standard Glossary and Taxonomy Charts, Graphs, Generators Authoring of blogs and articles for influencing
Mission-Based Counterintelligence Deception Planning Placement of specific concepts and phrases
Counter Collection and Anticipation Deception Chain Cyber Persona Layer
Denial and Deception Types of Denial and Deception Cyber Persona Development and Maintenance
Counter-Denial and Deception D&D Usage Character archetypes
Open Source Intelligence in Deception Operations Perception as Deception Establish the storyline
VPNs and Burn Phones (US Only) Avoid and Deny Establish the plot synopsis
Methods of Social Media Research Shifting the Conversation Story weaving and management
Social media demographics Forum Manipulation - COINTELPRO Target profiles – dossiers
Cyber Target Acquisition and Exploitation Social Psychology Target gap analysis
Identify Active Adversary Campaigns Persuasion Clandestine Collection Operation
Intent, Motivation, Goals, & Requirements Differences in Culture/Diversity Surveillance and Counter Surveillance
Passive data collection Hofstede Dimensions CI Insider Threat, Investigations
Campaign development Reciprocity and Consistency Guide to Underhanded Tactics
Vectors of approach Social validation Rules for Radicals
Courses of action Liking, Authority, and Scarcity Case Studies
Elicitation and exfiltration Rules of Disinformation Team Presentations
Memetic Engineering Information Warfare Content Creation
Operational Security MORE DETAILS BELOW

This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome.


Structured Analytic Techniques

10-04-2021 11:20 am - 10-06-2021 11:20 am
Early bird discount of $1000 on checkout - Enter coupon EarlyBirdSATs

SALE ongoing Early Bird discount of $1000.00! This course takes from the best of the intelligence community, academia, years of hands-on activities to move your cyber threat intelligence program to a sustainable model adding real value to all stakeholders. We set students up for success building a model that moves cyber threat intelligence functions to the role of trusted advisor assisting in business decision-making. The course not only educates the student but prepares the student to educate leadership, integrate into corporate business processes while delivering timely intelligence. We help students get to the point where they really understand the challenges of corporate decision-makers using inside and outside sources.

Luminary Hotel & Co., Autograph Collection


The course is timely, contextually needed, and moves the market while establishing the cyber threat intelligence analyst as a true discipline greatly needed in all corporate environments.

Analysis, as practiced in the intelligence, law enforcement, and business communities, is steadily evolving from a mental activity done predominantly by a sole analyst to a collaborative team or group activity. The driving forces behind this transition include the following: The growing complexity of international issues and the consequent requirement for multidisciplinary input to most analytic products. The need to share more information quickly across organizational boundaries. The dispersion of expertise, especially as the boundaries between analysts, collectors, operators, and stakeholders become blurred. The need to identify and evaluate the validity of alternative mental models. The need to counter the use of social media to distribute Digital Disinformation or fake news.


Analytic Writing

10-07-2021 11:22 am - 10-08-2021 11:22 am
Early bird discount of $500 on checkout - Enter coupon EarlyBirdWriting

The Treadstone 71 Analytic Writing, Reporting, and Dissemination course cover intensive writing training, exercises, the peer review process, briefings and reviews, report types, and dissemination techniques. We follow the intelligence community and proven academic methods validated and verified through years of execution.

Luminary Hotel & Co., Autograph Collection


The course covers non-inclusively:

Analytic Writing, Reports, and Briefs

  • How to write effective intelligence reports
    • Templates, Case Studies, Assignments
    • Editing methods
    • Clarity and concise writing
    • Rules for Effective Writing
    • Tools to assist in simplifying your writing
  • Intelligence Community Directives
  • Professional Development Framework - UK
  • Analytic Writing Standards - Writing Products - Methods to Write Right
  • AIMS BLUF and the Analytic Line of March - Analytic Progression
  • The Writers Rubric - Peer Review
  • Confidence Levels
  • Likelihood and Probability
  • Report Types and Templates
  • Product Line Mapping - Examples
  • Briefings
  • Presentational Methods
  • Feedback Loop

Contact Treadstone 71 Today for all your Cyber Intelligence needs.