Free Cyber Intelligence Short Course

04-21-2020 2:00 pm - 04-21-2026 3:00 pm
Free Cyber Intelligence Short Course

Treadstone 71 Training and Webinars

Intelligence Community-Driven Content  - Free Short Course from Treadstone 71

This free course provides an overview of the Certified Threat Intelligence Analyst online instruction as well as pre-recorded webinars on Stakeholder Management, Adversary Targeting, Intelligence Requirements, STEMPLES Plus, and Collection Management.

The short course provides an overview of:

  • Treadstone 71 History
  • Training and Webinar Approach
  • Risk versus Intelligence
  • Forecasts - Estimates
  • Cyber Intelligence Lifecycle
  • Intelligence COmmunity Taxonomy
  • Areas of Intelligence
  • OPSEC - Data Provenance - Source Validation-Evidence Credibility
  • Stakeholder Management
  • Adversary Targeting
  • STEMPLES Plus - Indicators of Change
  • Intelligence Requirements
  • Logical Adversaries
  • Threat Matrices
  • Collection Plans - Request for Information
  • Structured Analytic Techniques
  • Analysis of Competing Hypotheses
  • Critical Thinking
  • Cognitive Bias
  • Types of Analysis - Reasoning Methods - Synthesis
  • Production - Analysis - Interpretation - Intuition - ATT&CK
  • Analytic Writing
  • Briefs and Reports
  • Argument Mapping

ON DEMAND BUNDLE - Certified Threat Intelligence Analyst Plus 6

05-04-2020 - 05-03-2021

This is an on-demand course that runs up to 12 weeks.


The online courses are instructor video and audio recorded with periodic direct interaction with the instructor via online web meetings. The instructor will have standard office time for questions and answers as well as regular access via class email and other messaging options.

Validated and registered students will receive login and preparation information 1 week prior to class start. Prospective students must send an email to This email address is being protected from spambots. You need JavaScript enabled to view it. from a corporate account to validate course eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors.

This course follows (non-inclusively) the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training.

  • Introduction to Intelligence
  • Critical Thinking
  • Analytic Writing
  • Creative Thinking
  • Analytic Briefing
  • Structured Analytic Techniques.
  • Analytic Issues
  • Argument Mapping
  • Case Studies

Latest student testimonial: 

"With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real-world scenarios establishing a solid understanding of using these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine-tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional."

  • Anonymity and Passive Persona setup
  • Collection Methods and Techniques - WITH AN ADDED LECTURE ON COLLECTION MANAGEMENT
  • Collection Process Flow
  • Collection (OSINT) Tools and Targeting
  • Most likely Threat Actors
  • Hunch.ly
  • Use of Maltego – overview
  • OPSEC – VPNs, Buscador, Authentic8 Silo - WITH AN EXTENDED OPSEC LECTURE
  • OSINT Browser – Oryon C Portable
  • Proxy Access – the DarkNet
  • Burn phone set up and use (US Only)
  • Open Source Intelligence OSINT
  • Production Methods
  • Structured Analytic Techniques – Their use
  • Adversary Denial and Deception
  • Source Credibility and Relevance
  • Source Validation
  • Denial and Deception
  • Confidence Levels
  • Types of evidence
  • Production Management
  • Critical and Creative Thinking
  • Cognitive Bias
  • Glossary and Taxonomy
  • What Intelligence Can and Cannot Do
  • Use of Mitre ATT&CK in Analysis
  • ATT&CK in examining patterns and trends
  • ATT&CK in Adversary tendencies
  • Estimation and Forecasting
  • Campaign analysis
  • Types and Methods of Analysis
  • Synthesis and Fusion
  • Analysis of Competing Hypothesis
  • Inductive/Abductive/Deductive Reasoning
  • Stakeholder Identification, and Analysis WITH AN ADDED LECTURE ON STAKEHOLDER MANAGEMENT
  • Analytic Writing, BLUF, AIMS
  • Forecasting in your writing
  • STEMPLES Plus, Indicators of Change WITH AN ADDED LECTURE ON STEMPLES Plus, Indicators of Change and Hofstede Principles
  • Argument Mapping
  • Types of Reports
  • Product Line Mapping
  • Report Serialization, and Dissemination
  • Live Case Studies – Class briefs
  • All Case Studies use all methods, techniques, and tools referenced in the course material. The Case Studies used are straight from the headlines giving students real world experience during the class.

All students receive 2 books and 50 plus course documents, VPN, and other course material.


Certifed Cyber CounterIntelligence Analyst

07-01-2020 - 05-01-2026
Certifed Cyber CounterIntelligence Analyst

This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome.

8 to 12 Weeks - On-Demand - Online

Cyber Infiltration Propaganda and Fallacies Cyber Psychological Operations
Information Operations Media Manipulation Target analysis and manipulation
Standard Glossary and Taxonomy Charts, Graphs, Generators Authoring of blogs and articles for influencing
Mission-Based Counterintelligence Deception Planning Placement of specific concepts and phrases
Counter Collection and Anticipation Deception Chain Cyber Persona Layer
Denial and Deception Types of Denial and Deception Cyber Persona Development and Maintenance
Counter-Denial and Deception D&D Usage Character archetypes
Open Source Intelligence in Deception Operations Perception as Deception Establish the storyline
VPNs and Burn Phones (US Only) Avoid and Deny Establish the plot synopsis
Methods of Social Media Research Shifting the Conversation Story weaving and management
Social media demographics Forum Manipulation - COINTELPRO Target profiles – dossiers
Cyber Target Acquisition and Exploitation Social Psychology Target gap analysis
Identify Active Adversary Campaigns Persuasion Clandestine Collection Operation
Intent, Motivation, Goals, & Requirements Differences in Culture/Diversity Surveillance and Counter Surveillance
Passive data collection Hofstede Dimensions CI Insider Threat, Investigations
Campaign development Reciprocity and Consistency Guide to Underhanded Tactics
Vectors of approach Social validation Rules for Radicals
Courses of action Liking, Authority, and Scarcity Case Studies
Elicitation and exfiltration Rules of Disinformation Team Presentations
Memetic Engineering Information Warfare Content Creation
Operational Security MORE DETAILS BELOW

Contact Treadstone 71 Today for all your Cyber Intelligence needs.