331-999-0071

Summer of Cyber

Fort Myers, Florida is the host of three weeks of cyber intelligence training by Treadstone 71. Seating is limited. COVID-19 vaccination required. Join us for three weeks of training in downtown Fort Myers on the Caloosahatchee River waterfront.

July 19-August 6 and September 20-October 8

EARLY BIRD DISCOUNTS AVAILABLE THROUGH JUNE 10

2021-05-04_8-53-39

Certified Cyber CounterIntelligence Analyst

July 19-23 – Marriott Luminary Hotel – 220 Edwards Drive, Ft. Myers, FL 33901 – 833-918-1512

September 27-October 1 Marriott Luminary Hotel – 220 Edwards Drive, Ft. Myers, FL 33901 – 833-918-1512

Structured Analytic Techniques

July 26-28 – Marriott Luminary Hotel – 220 Edwards Drive, Ft. Myers, FL 33901

October 4-6 Marriott Luminary Hotel – 220 Edwards Drive, Ft. Myers, FL 33901 – 833-918-1512

Analytic Writing

July 29-30 – Marriott Luminary Hotel – 220 Edwards Drive, Ft. Myers, FL 33901

October 7-8 Marriott Luminary Hotel – 220 Edwards Drive, Ft. Myers, FL 33901 – 833-918-1512

Strategic Intelligence Analysis (includes the Certified Cyber Intelligence Analyst course)

August 2-6 – Marriott Luminary Hotel – 220 Edwards Drive, Ft. Myers, FL 33901

23 minutes from RSW Southwest Florida International Airport

Certified Cyber Intelligence Analyst

September 20-25 Marriott Luminary Hotel – 220 Edwards Drive, Ft. Myers, FL 33901 – 833-918-1512

Contact Treadstone 71 for combination and group rates. Seating is limited.

Training - Knowledgebase - Consulting Bundle Subscription

Treadstone 71 announces our new Training Subscription Program for Cyber Intelligence.

Bring your teams together and harness the power of team-based, corporate targeted, virtual cyber intelligence learning. Treadstone 71 delivers a comprehensive set of cyber threat intelligence and counterintelligence training for your organization geared to instruct and provide hands-on learning while maturing your program. Our courses are specifically built targeting the cyber intelligence lifecycle.

Everybody is offering online subscriptions! Why is ours different?

SUBSCRIBE BY 1 NOVEMBER 2020 AND RECEIVE ... READ ON

Great question! We not only offer intelligence training developed by intelligence community professionals, but our offer also delivers knowledgebase access, and four weeks of consulting over a two-year period if you act soon. Read on ->

Our two-year subscription program geared towards the company and not the individual delivers access to all Treadstone 71 online training and certifications over a period of 24 months. Our one price program enables an unlimited number of your employees to take our courses as desired within a 24-month period. This includes courses and webinars covering:

  • Analytic Writing
  • Adversary Targeting
  • Collection Management
  • Collection Manager's Course
  • Cyber CounterIntelligence Tradecraft - Certified Threat CounterIntelligence Analyst
  • Cyber Intelligence Tradecraft - Certified Threat Intelligence Analyst
  • Intelligence for the C-Suite
  • Intelligence Requirements
  • Open Source Intelligence
  • Stakeholder Management
  • STEMPLES Plus - Indicators of Change
  • Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence
  • Structured Analytic Techniques

Treadstone 71 Subscription Services

Invalid Input

Invalid Input

Invalid Input

Invalid Input

Invalid Input

No Gmail, Hotmail, Outlook, Live, Yahoo, etc. We will only address requests from valid business/organizational email accounts.

Invalid Input

Invalid Input

The process is simple. Signup for the subscription service, provide the initial list of your employees, and sit back and watch them perform. How do you track their training activities? Treadstone 71 provides the following reports:

  • Individual Progress Reports
  • Graded Quiz Scores (if and when applicable)
    • Graded quiz results showing the student’s quiz answers. The option the students selected for each question is shaded green.
    • We can set the passing grade for a standard 80% or at any number you wish, allow as many retakes as you wish of the quiz and reset the quiz so students can retake the quizzes.
  • Lectures Completed with video completion heatmap
    • The video heatmap indicates which parts of a video have been watched (green), re-watched (yellow), re-watched multiple times (orange) or skipped (white). Of course, we can require video completion before allowing the student to move to the next lecture.
    • New heatmaps for each video watching session.
  • The ability to reset lecture, video, and quiz progress.

Treadstone 71 even gives you the ability to manage your students. Your point of contact for the Treadstone 71 online training will be able to add new users, unenroll students, and view user information in the Users section of the School Administration.

We will also customize your course area with your logos, your documents (8 hours of document modifications included in the price), and your internal videos if so desired. This gives your course a more personal touch with standard corporate logos.

Not only can you manage your own students, but Treadstone 71 will adjust case studies to fit your organization, your vertical, and your industry. This provides greater relevance to you learning activities.

How do we apply the knowledge gained into an actual program?

We help you with this in two ways:

  1. Not only do you get unlimited access for an unlimited number of students for two years, but if you act within the next 120 days, Treadstone 71 will provide access CyberIntellipedia-our online knowledgebase wiki. This wiki is an online system for collaborative data sharing built and used by Treadstone 71 to aid in building Cyber Threat Intelligence programs while establishing intelligence sharing and communities of interest.
    1. The Treadstone 71 Cyber Intelligence Training Courses led to the establishment of CyberIntellipedia, a wiki consisting of multiple sections covering strategic planning, policies, procedures, templates, taxonomy, examples, dossiers, finished intelligence, estimative intelligence, open-source tools, adversary research, process flow diagrams, reporting, analytic tools and methods, threat intelligence TTPs, and more. From job descriptions and C-Suite presentations to cyber intelligence maturity models and threat matrices.
    2. CyberIntellipedia aligns with the Treadstone 71 Cyber Intelligence Training Courses including aspects of cyber intelligence tradecraft and cyber counterintelligence tradecraft. The wiki follows the intelligence lifecycle providing in-depth documentation for each aspect of the iterative process. We continue to enhance and build CyberIntellipedia including adding a historical cyber adversary component covering attacks, adversaries, their methods, tactics, techniques, and procedures indexed for rapid search.
    3. CyberIntellipedia delivers the tools necessary to build a sustainable program. The wiki gives users access to twelve years of effort demonstrating proven success for cyber threat intelligence strategies, operational efficiencies, tactical methods, and technical alignment.
    4. Organizations pay hundreds of thousands of dollars over years of labor to establish what is in the Cyber & Threat Intelligence Wiki - CyberIntellipedia. With guidance and time-based direction, clients can build a complete intelligence program, educate stakeholders, staff, and leadership, without the usual massive outlay for time and materials, and commitment to constant consultant change orders.
  2. By acting within before 1 November 2020 (subscribe to the Treadstone 71 Subscription Bundle), you will also receive four weeks of consultative support over the two-year period. We will assess your intelligence program status, help you apply the learning, assist you with the structure of your cyber and threat intelligence strategic plan, and provide a detailed project plan and maturity roadmap. Since this is four weeks over two years, we can assess where you are and deliver locally relevant goals, objectives, and measurable target outcomes.

How many CPEs can each student earn?

Every student can earn:

Analytic Writing

 24 CPE

Adversary Targeting

 2 CPE

Collection Management

 2 CPE

Collection Manager's Course

40 CPE

Cyber CounterIntelligence Tradecraft - Certified Threat CounterIntelligence Analyst

40 CPE

Cyber Intelligence Tradecraft - Certified Threat Intelligence Analyst

40 CPE

Intelligence for the C-Suite

6 CPE

Intelligence Requirements

2 CPE

Open Source Intelligence

24 CPE

Stakeholder Management

2 CPE

STEMPLES Plus - Indicators of Change

6 CPE

Strategic Intelligence Analysis, Forecasting, Estimative and Warning Intelligence

40 CPE

Structured Analytic Techniques

40 CPE

TOTAL CPEs POSSIBLE

244 CPE

 

  • What do I need to access and perform the training?
    • An internet connection, a laptop (Windows works best due to the open source tools), and a desire to excel.
  • How will this help our company with cyber threat intelligence?
    • Our training follows intelligence community standards and includes practical and pragmatic approaches to intelligence learned over the past 38 years.
  • Do we have to pay all at once?
    • Treadstone 71 offers quarterly payments, bi-annual, and annual payments.
  • How many times can a student take the same courses?
    • As many times as they wish.
  • Is the training self-paced?
    • Our longest courses are geared for 8 weeks (40 CPE courses) but this timeframe can easily be extended.
  • Can we work in groups?
    • Treadstone 71 highly recommends groups in our training since intelligence is a team exercise. We find groups made up of different internal team members makes for a great way to build camaraderie and understanding.

The Treadstone 71 Online Cyber and Threat Intelligence Subscription Program reduces your training budget while delivering industry standard instruction coupled with an extensive knowledgebase and complemented by a four week in-person and online assessment and support program. Working from home and online training are nothing new. 24x7 portal access gives students the ability to tackle learning when they are available. The portal also has an iOS specific app for iPhone and iPad users.

So, what do you get?

  • Any-time access for two years.
  • Developed and delivered by Intelligence Community professionals.
  • Instructor office hours, access via Slack, questions via online comments, direct access to secure methods of communication to the instructor.
  • Two-year unlimited number of students’ access to all Treadstone 71 online courses.
    • Students also receive course books via the Kindle App (for courses with books), two-year VPN access, two-year access to Hunchly, and lifetime access to Start.me and the Hemingway Editor.
    • TERMS AND CONDITIONS APPLY

If you subscribe in total by November 1, 2020, you also get:

  • Access to the Treadstone 71 online knowledgebase wiki – CyberIntellipedia
    • Scores of plans, procedures, process flows, and methods all taken directly from cyber and threat intelligence program builds over the years.
  • Four weeks of online and onsite cyber and threat assessments, program build, and strategic support.

Treadstone 71 Subscription Services

Invalid Input

Invalid Input

Invalid Input

Invalid Input

Invalid Input

No Gmail, Hotmail, Outlook, Live, Yahoo, etc. We will only address requests from valid business/organizational email accounts.

Invalid Input

Invalid Input

For pricing and more details, contact Treadstone 71 using the form below and we will set up a time to chat at your convenience.  Terms and conditions apply. Subscription in total refers to signed agreements and the first payment.

Treadstone 71 offers an affiliate program for known entities who wish to resell our training, both online and in-person. The affiliate program offers percentage commissions that grow based on numbers of registered students. We offer tiered programs that reward the aggressive affiliate.

We also offer white label and partnership programs for organizations that wish to resell our services and partner with our consulting. We offer tiers of commissions based on numbers. The more you sell, the more we both earn. 

Have an idea of how to work with us? Send it along!

To learn more:

Please complete this short form and your data sheet will be emailed to you. All fields are required. Corporate email accounts only - no Gmail, Yahoo, or other free mail accounts accepted.
Please enter your name.

Please enter your title.

Please enter your company.

Please enter a valid email address.

Invalid Input

Treadstone 71 at RSA

Deception, distortion, dishonesty are core to social media postings. Our adversaries use these methods concocting stories that create illusions that are meant to leave us divided. The talk will cover methods of countering their messaging while applying these tactics to protect your own organization and brand. Moving from intelligence to counterintelligence is the natural next step in our evolution.

Learning Objectives:
1: Learn about Russian adversary methods of deception.
2: Learn tactics that utilize memetic engineering.
3: Learn how to counter the adversaries’ methods.

Cyber-Counterintelligence—Deception, Distortion, Dishonesty

Treadstone 71 Cyber Threat Intelligence Webinars

Treadstone 71 Cyber Threat Intelligence Webinars

Five One Hour Cyber Threat Intelligence Pre-recorded Webinars covering

Free Short Course on our cyber intelligence training courses (www.cyberinteltrainingcenter.com)


Webinar link to be provided upon enrollment.

REGISTRATION REQUIREMENT: A VALID COMPANY EMAIL ADDRESS - ANY REGISTRATION OUTSIDE THIS REQUIREMENT WILL BE REJECTED. DO NOT REGISTER WITH GMAIL, HOTMAIL, OUTLOOK, YAHOO, PROTONMAIL, MAIL, TUTANOTA OR ANY TEMPORARY OR NON-GOVERNMENT OR COMPANY EMAIL. COMPANY MUST BE LEGITIMATE. THE ORGANIZATION MUST NOT BE TIED TO AN ADVERSARY GOVERNMENT OR ORGANIZATION.

Students Receive:

  • 1 CPE per Webinar
  • Templates and Forms used in the Webinars
  • 10% discounts on Treadstone 71 Training (online and in-person) for up to 1 year from the last Webinar completion date (May 12 to May 11, 2021)

Student requirements:

  • Laptop
  • WebEx software
  • Earphones and microphone preferred

Cyber Threat Intelligence – Stakeholder Management

On-Demand Webinar Registration

  1. Support to Leadership
    1. During Webinar Exercise
  2. Purpose of Stakeholder Analysis
  3. Questions used to organize your products
  4. Know your customer checklist
  5. Getting started checklist
  6. High-level process overview
  7. Steps to follow
    1. Sample Invitation Letter
  8. Strategic Questioning and Listening
    1. Active and Empathic Listening
  9. Stakeholder Collection and Tracking Model
    1. Reporting formats for real-time interaction
    2. Choices of visual support materials
    3. Stakeholder Impact and Influence
  10. Exercise Redux
  11. Wrap-up // Q&A

Cyber Threat Intelligence – Adversary Targeting

On-Demand Webinar Registration

  1. What is D3A?
  2. D3A Targeting Requirements
    1. Adversary Identification
    2. Breakdown
  3. Bring in Stakeholder Requirements
  4. What is F3EAD?
  5. The D3A/F3EAD Integrated Process
    1. Aligned to the Cyber Threat Intelligence Lifecycle
    2. Integrated Lifecycle Breakdown
    3. The Full Lifecycle
  6. Logical Adversaries to Intelligence Requirement Development
    1. Building Threat Matrices
    2. Simple to Complex
    3. Inclusion of ATT&CK Groups aligned to Nation-States
  7. Exercise Redux
  8. Wrap-up // Q&A

Cyber Threat Intelligence – Intelligence Requirements

On-Demand Webinar Registration

  1. Introduction
  1. Priority Intelligence Requirements (PIR) – What are they?
    1. During Webinar Exercise
  2. Intelligence Requirements
  3. Common Adversaries
  4. Information Requirements Process Flow
    1. Intelligence Requirements
    2. Essential Elements of Information
    3. Specific Information Requirements
    4. Indicators
    5. The Overall IR Process Flow
  5. Targeting – Intelligence Collection
  6. Information Required Prior to Intelligence Requirements
  7. Prioritization
    1. What is an Intelligence Requirement
    2. What is a Priority Intelligence Requirement
    3. Prioritization continued
  8. Collector/Analyst Need to Understand
  9. Stakeholder knowledge of their systems and data
  10. Intelligence Team Priority Intelligence Requirements Examples
  11. Get them to requirements
  12. Exercise Review
  13. Wrap-up and Q&A

Cyber Threat Intelligence – STEMPLES Plus – Indicators of Change – Hofstede Principles

On Demand Webinar Registration

  1. STEMPLES Plus – Strategic Analysis
  2. The Six Categories – ASCOPE
    1. Area
    2. Structures
    3. Capabilities
    4. Organizations
    5. People
    6. Events
  3. D3A Targeting F3EAD
  4. STEMPLES Plus
    1. Social
    2. Technical
    3. Economic
    4. Military
    5. Political
    6. Legal/Legislative
    7. Educational
    8. Security
    9. PLUS
      1. Religion
      2. Demographics
      3. Linguistics
  1. Psychological
  2. Other
  3. Indicators of change
    1. Motive thru Capabilities
    2. Levels of Concern
    3. Example
  4. Hofstede Principles
    1. Power and Distance
    2. Individualism and Collectivism
    3. Masculinity and Femininity
    4. Uncertainty Avoidance
    5. Long Term and Short Term
    6. Indulgence and Restraint
    7. Hofstede Country Comparison Exercise
  5. Wrap up and Q&A

Cyber Threat Intelligence – Collection Management

On Demand Webinar Registration

  1. Definition
  2. Requirements Management
  3. Mission Management
    1. Mission Analysis
    2. Gaps
  4. Collection Planning
    1. Simplified Process
  5. Collection Strategy
    1. Intelligence Collection Synchronization
  6. Collection Operations
    1. Principles
  7. Collection Manager Tasks
    1. Bringing in Intelligence Requirements
    2. A Multidisciplinary Approach
    3. Available Assets
  8. Request for Information
    1. RFI Template
  9. Complete a Plan
    1. The Collection Plan Templates
    2. Breakdown of the template
    3. Collection Manager Tasks Redux
    4. Example completed plan
  10. Iterative feedback – Constant communication
  11. Wrap up and Q&A

Contact Treadstone 71

Please note that only corporate email domains are allowed. Gmail, Hotmail, Yahoo, etc will be rejected.

Please type your full name.

Invalid Input

Invalid Input

Invalid email address.

Please tell us your area of interest.

Invalid Input

Contact Treadstone 71 Today for all your Cyber Intelligence needs.

CONTACT US TODAY