Latest student testimonial: "With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to real world scenarios establishing a solid understanding on utilizing these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional."
CYBINT1 – Anonymity and Passive Persona setup, Collection Methods and Techniques, Collection Planning, PIRs, Collection Tools and Targeting, Alignment with Hunt and Detect Needs, Ties to CSIRT, TTPs, IoCs, Threat Intelligence, Open Source Intelligence, All-Source Intelligence, Standard Glossary and Taxonomy – 1 Days (Case Study 1)
CYBINT2 – Organization, Production, and Structured Analytic Techniques, Adversary Denial and Deception, Use of Techniques, Types of evidence, Production Management, Critical Thinking, Metrics, Intake forms, and templates – 1 Day (Case Study 2)
CYBINT3 – Types and Methods of Analysis, Decomposition, Recomposition, Methods for Fusion, Case Studies in Analysis, Cognitive Bias, Credibility and Reliability of Sources, Confidence Levels, Analysis of Competing Hypothesis, Evidence Diagnosticity, Scenario Analysis, Flow into Hunt, Detect, CSIRT, TTPs, IoCs, Inductive/Abductive/Deductive Reasoning, Historic trending and campaign analysis, Intelligence for organizational resilience – 1 Day (Case Study 3)
CYBINT4 – Case Study 4, Identifying Your Consumers, Stakeholder Identification, and Analysis, Standing Orders from Leadership, Overview of Argument Mapping, Analytic Writing, BLUF, AIMS, Types of Reports, Product Line Mapping / Report Serialization, and Dissemination, Cyber and Threat Intelligence Programl. Case Study Presentations 2 Days
Lecture, Hands-on, Apprenticeship, in class exercises, student presentations, analytic products, templates, course material—40 CPEs
All Case Studies use all methods, techniques, and tools referenced in the course material. The Case Studies used are straight from the headlines giving students real world experience during the class.
The course runs over five consecutive days covering Monday through Friday. Students are expected to attend each hour of each day since the course is comprehensive with each day building upon the next. Days may start at 7:45 AM and may run to 5 PM on M-Th and end on Friday around 2-3PM. Breakfast, lunch, and afternoon snacks/tea are provided. Lunches are usually working lunches. Class minimum is 12 with a maximum of 25. .
Students who complete the course will be certified as Cyber Intelligence Tradecraft Professional. 40 CPEs awarded for the course. This course is highly specialized following intelligence community tradecraft. You won’t get this at SANS. You won't get this anywhere but from Treadstone 71. If you want purely technical, then this is not the course for you. If you want tradecraft that lays the foundation for a solid program, education that creates a lasting impact, then this is the course for you.
Course books and manuals will be provided to students upon accepted enrollment. This course follows traditional intelligence community tradecraft. Treadstone 71 has been teaching cyber intelligence courses in various forms for six years. From academic settings and corporate environments to government facilities. Our customers include some of the largest firms in the world many of whom are part of critical infrastructures recognizing the need to learn how to create intelligence (www.treadstone71.com). We support our training with onsite consulting services that teach you how to create a sustainable program aligned to stakeholders. Ultimately, we teach you what most vendors cannot or will not – how to fish for yourself.
Send an email to firstname.lastname@example.org from a corporate account to validate course eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo and the like).
NOTE: Organizations sending 3 or more students are eligible for other discounts. Contact Treadstone 71 at email@example.com for more information.
NOTE: CORPORATE PURCHASE ORDERS can be arranged. Please contact us at firstname.lastname@example.org to begin the process.
To Receive the Early Registration Discount of $1,000.00 off, add EarlyPay in the Coupon Code field during registration. Good through May 1, 2018. DiscountPay for $500.00 off in the Coupon Code Field good through May 20, 2018.
Course Fee, Course Lab, and Materials Fee (includes books, templates, structured techniques application, etc.). $4990.00 required by April 5, 2017, before course start.
This course combines lecture, research, and hands-on team assignments. Students need to bring a laptop (PC or MAC) that does not have corporate controls (tablets will not suffice). PC works best.
How is this course different from the current Treadstone 71 Cyber Intelligence course?
This course provides definitive sections along the intelligence lifecycle that are in-depth. Students are required to demonstrate understanding and use of collection methods using defined targets and target case studies, understanding and applying analytic techniques, when and how to use analytic techniques and analytic types. Students are presented case studies for analysis, required to use tradecraft methods, and provide written reports in standard analytic format. Students are also required to orally present their deliverables to the class. You will leave this course with the tools, methods, and understanding necessary to enhance your intelligence program. Treadstone 71 helps you focus on analytical tradecraft. The course provides the principles and tools used by analysts to instill rigor in thinking and prevent cognitive biases from skewing analytic judgments. Through the use of structured analytic techniques, analysts make their argumentation and logic more transparent and subject to further investigation.
“The Cyber Intelligence Training delivered and created by Jeff Bardin will add rapid returns to both Cyber Intel Analysts, and your Security Operations. This very thorough class adequately prepares the student for your Cyber Intelligence function. This class starts with the history of intelligence as a tradecraft and the evolution to the digital corporate world. Along the way, each student receives quality instruction and hands-on experience with today’s OSINT tools. This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.”
“The class was very detail orientated with a strong focus on the work of Cyber threats and how to better secure your assets against potential attacks. For most scenarios, we went through he had an open source tool, or the link to a paid version, to monitor or prevent the attacks from occurring. He was able to answer each and every question asked with specific details, and then some. I would sign up again right away for any other classes offered by Jeff.”
"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real world efforts. Have to say this is one of the best classes I have ever taken having taken many from SANS. SANS does not compare. They are more of a class mill today. The Treadstone 71 course material is unique, focused, and timely."
“The Cyber Intelligence training offered by Treadstone71 is definitely an outstanding course and I recommend it for any organization looking to implement an intelligence capability. Jeff Bardin is extremely knowledgeable in the intelligence tradecraft and applies it to the cyber realm in a way that is understandable, exciting to learn and makes it easy to achieve “quick wins” in the organization after completing his class. Jeff provided the class with a multitude of tools, templates, and documents that can immediately be used by any organization focused on intelligence collection and analysis. Jeff arrived well prepared to teach the course and one of the most impressive aspects of the class was that he presented the material in a way that displayed his personal knowledge and experience in the field rather than relying solely on book material. We intend to continue leveraging Jeff’s services as we mature our cyber intelligence capability and highly recommend Treadstone71’s services to any organization.”
“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”
“This course was excellent. I was concerned coming into it that I would already know all the course material (I have been doing this sort of work for 15 years, specifically the type of work this course covered). As it turns out, it was a good reminder of what I should be doing to improve structure and rigor, and provided good tools, some of which I had not seen before. If I was new to this field, or looking for a good insight into how Intelligence should work (i.e.: most of the rest of the class), I believe this would have provided even more value. I have already recommended it to a couple of my former colleagues in this line of business, and would happily recommend it for future use by ########.”
I attended this week-long class (along with several other #### folks and a mix of cyber-professionals from industry) that focuses on everything from open source Intel gathering to Intel reporting to hacking. While it is really targeted towards Intel specialists, those of us who aren't steeped in the business were able to keep up. We now have a much better understanding of the intel cycle (both for government and industry), the ways that one can remain unattributed on the net, the myriad of tools for gathering open source information, and how to grade the validity and relevance of information.
A few points for those that may consider this class:
1. It assumes a good knowledge of how all the internet search engines work and shows you how to use more capable versions of Firefox, Chrome, etc.
2. You will get a ton of information (at both the entry level and above) on how to plan, collect, analyze, organize, and deliver Intel.
3. Treadstone 71 provides you with a ton of resources (some of them loaded up on a nifty Amazon Fire tablet that you get to keep) that you can take with you if this is going to be your business. This includes tools to recognize and combat cognitive bias.
4. Intel is hard and open source is even harder--there are not many black/white answers. The three case studies were good in that they showed all the layers of information a good analyst can peel back.
5. We also got experience with the time crunch associated with flash reporting.
As a non-intel type, I thought the class was very useful since it helps me understand the customer better. I would certainly recommend it to people working in this arena and for anyone who wants to stretch their mind a bit.
Breakfast and lunch served daily
Afternoon snack provided
Course material is not for resale or commercial use outside the end user license agreement. Course material may not be used for competitive purposes.
You must attend the full class in order to receive all course material and the certification. Certification is granted after completion of course instruction and hands-on application of the concepts in 3 to 4 team exercises. If a student leaves the class prior to course completion, neither the certification is granted nor is the course material covered after the student leaves made available. Lectures and associated material is posted each day after each lecture. This method supports the student in a just-in-time manner. This method ensures full understanding of the material without discovering course plot lines until the proper time. The course is architected to support a particular process flow and learning method.
DATE TBD. 7:45AM - 5PM Monday through Thursday. 7:45AM - 3PM Friday.
Laptops without corporate controls required. Personal laptops allowed. Administrative access required. Pre-requisites - Strong understanding of the Internet and web browsers. MAC or PC is fine butPCs preferred. Tablets will not work.
All students need to take the below Myers-Briggs personality test prior to the class. This may be performed here: www.humanmetrics.com/cgi-win/jtypes2.asp
Target audience: CISOs, SOC Managers, Cyber / Information Security VPs, Directors, Analysts, Intelligence analysts, law enforcement, Intelligence Community, and those wishing to learn proper methods of analysis.
No refunds allowed after May 1, 2018. Refunds are minus processing fees. Please read the course end user license agreement: