Intelligence Community-Driven Content - Free Short Course from Treadstone 71
This free course provides an overview of the Certified Threat Intelligence Analyst online instruction as well as pre-recorded webinars on Stakeholder Management, Adversary Targeting, Intelligence Requirements, STEMPLES Plus, and Collection Management.
The short course provides an overview of:
This is an on-demand course that runs up to 12 weeks.
20% VETERANS DISCOUNT
The online courses are instructor video and audio recorded with periodic direct interaction with the instructor via online web meetings. The instructor will have standard office time for questions and answers as well as regular access via class email and other messaging options.
This course follows (non-inclusively) the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training.
Latest student testimonial:
"With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real-world scenarios establishing a solid understanding of using these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine-tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional."
All students receive 2 books and 50 plus course documents, VPN, and other course material.
This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome.
8 to 12 Weeks - On-Demand - Online
|Cyber Infiltration||Propaganda and Fallacies||Cyber Psychological Operations|
|Information Operations||Media Manipulation||Target analysis and manipulation|
|Standard Glossary and Taxonomy||Charts, Graphs, Generators||Authoring of blogs and articles for influencing|
|Mission-Based Counterintelligence||Deception Planning||Placement of specific concepts and phrases|
|Counter Collection and Anticipation||Deception Chain||Cyber Persona Layer|
|Denial and Deception||Types of Denial and Deception||Cyber Persona Development and Maintenance|
|Counter-Denial and Deception||D&D Usage||Character archetypes|
|Open Source Intelligence in Deception Operations||Perception as Deception||Establish the storyline|
|VPNs and Burn Phones (US Only)||Avoid and Deny||Establish the plot synopsis|
|Methods of Social Media Research||Shifting the Conversation||Story weaving and management|
|Social media demographics||Forum Manipulation - COINTELPRO||Target profiles – dossiers|
|Cyber Target Acquisition and Exploitation||Social Psychology||Target gap analysis|
|Identify Active Adversary Campaigns||Persuasion||Clandestine Collection Operation|
|Intent, Motivation, Goals, & Requirements||Differences in Culture/Diversity||Surveillance and Counter Surveillance|
|Passive data collection||Hofstede Dimensions||CI Insider Threat, Investigations|
|Campaign development||Reciprocity and Consistency||Guide to Underhanded Tactics|
|Vectors of approach||Social validation||Rules for Radicals|
|Courses of action||Liking, Authority, and Scarcity||Case Studies|
|Elicitation and exfiltration||Rules of Disinformation||Team Presentations|
|Memetic Engineering||Information Warfare||Content Creation|
|Operational Security||MORE DETAILS BELOW|