Cyber Intelligence Analyst Certification


When TBD
January 1 - December 31, 2017
7:45 AM


Where
Herndon

ACTUAL LOCATION TBD
Herndon, VA


Open Map in new window

Already Registered?

Enter your Last Name and Confirmation ID to review your record.


Last Name or Email
ID




Cyber Intelligence Analyst Certification
 
Registration Information - Treadstone 71 Cyber Intelligence Analyst Certification
Dates and Times TBD

https://cybershafarat.com/2016/07/31/intelligenceanalysis/  

Course syllabus and content proprietary to Treadstone 71
*********************************************************************
2017 Training Dates
  • 1/30-2/3 Amsterdam - Class Completed
  • 2/20-2/24-Chantilly
  • 3/13-3/17-Indianapolis area
    • https://stimulusengineering.regfox.com/cyber-series-course-1-cyber-intelligence-tradecraft-certification
    • https://stimulusengineering.regfox.com/cyber-series-course-2-cyber-counterintelligence-tradecraft-certification
    • https://stimulusengineering.regfox.com/cyber-series-course-3-clandestine-cyber-humint-osint
    • https://stimulusengineering.regfox.com/cyber-series-course-4-cyber-intelligence-analyst-certification
  • 4-10-4/14-Palo Alto
  • 5/1-5/5-Denver
  • 6/5-6/10-Chantilly
  • 7/17-7/21-Palo Alto
  • 8/7-8/11-Chantilly
  • 10/2-10/6-Palo Alto 
(or on demand including in-house or by location)

Treadstone 71 is working with FS-ISAC for training in London, Singapore, Malaysia, and Australia.

FS-ISAC Sponsored Courses:

Cyber Intelligence Tradecraft Training
3-7 April | Reston, VA
More | Register
Cyber Intelligence Tradecraft Training
8-12 May | London
More | Register
Cyber Intelligence Tradecraft Training
19-23 June | Reston, VA
More | Register
Cyber Intelligence Tradecraft Training
21-25 August | Reston, VA
More | Register
 

Unlike the Cyber Intelligence Tradecraft Certification course, the Cyber Intelligence Analyst course includes more depth and breadth associated with analysis.
 
The Cyber Intelligence Analyst course educates students on the processes in the production of intelligence in which intelligence information is subjected to systematic examination in order to identify significant facts and derive conclusions. The course also focuses on the determination of the significance of the information relative to information and intelligence already known, and drawing deductions about the probable meaning of the evaluated information. Students will learn:
 
  • Intelligence analysis as an inherently an intellectual activity that requires knowledge, judgment, and a degree of intuition.
  • Analysis as the process by which people transform information into intelligence. It includes integrating, evaluating, and analyzing all available data -- which is often fragmented and even contradictory -- and preparing intelligence products.
    • Despite all the attention focused on the operational (collection) side of intelligence, analysis is the core of the process to inform decision makers.
  • Analysis as more than just describing what is happening and why; identifying a range of opportunities… Analysis is the key to making sense of the data and finding opportunities to take action.
 
The course guides students through the conversion of processed information into intelligence through the integration, evaluation, analysis, and interpretation of all source data and the preparation of intelligence products in support of known or anticipated user requirements. Students will learn how to integrate, evaluate, and interpret information from available sources and develop intelligence products that enable situational awareness. Attendees practice and develop skills in applying learned techniques and methodologies appropriate to an issue to mitigate, gain insight, and provide persuasive understanding of the issue to stakeholders and organizational leadership.
 
This course follows the International Association for Intelligence Education Standards for Intelligence Analyst Initial Training.
 
I. Introduction to Intelligence
A. Intelligence Cycle: Discuss the intelligence cycle or process and how its components interrelate.
B. Intelligence Community Overview: Describe the intelligence community in which the agency runs and the roles of each participant.
C. Intelligence Classification: Apply the appropriate system of classification and markings to several documents.
II. Critical Thinking
A. Critical Thinking Defined: Explain what critical thinking is and why it is important to intelligence analysis and the problem-solving process.
B. Eight Elements of Thought: Apply Paul and Elder (or other recognized critical thinking) model using the Eight Elements of Thought (or related structure) to critically evaluate a written assessment.
C. Intellectual Standards: Describe the Paul & Elder intellectual standards (or other set of intellectual standards) and how they apply to intelligence analysis.
III. Analytic Writing
Note: references to standards can be substituted for applicable standards in the audience’s authority.
A.      Products Overview: Find traits of effective IC products.
B.       Tradecraft Standards: Relate analytic tradecraft standards to clear writing.
C.       Sourcing Standards: Practice writing in compliance with sourcing standards.
D.      Writing for Release: Demonstrate writing for release.
E.       Practical Exercises: Review and practice critical thinking skills in writing proper intelligence documents.
IV. Creative Thinking
A.      Brainstorming: Expand their view of alternatives.
B.       Rethinking: Challenge their assumptions and cognitive illusions.
C.       Lateral Thinking: Give alternative thinking modes.
D.      Red Teaming: Think from the opponent’s point of view.
E.       In Class Exercise: Give stakeholders/leadership options by presenting objective/defensible analysis and help them critically assess intelligence/information.
V. Analytic Briefing
       A.    Briefing Fundamentals: Describe the fundamentals of briefing.
       B.     Briefing Formulation: Formulate a briefing based on those fundamentals
       C.     Exercise: Give a short briefing on an intelligence topic – present analytic results orally
effectively.
VI. Structured Analytic Techniques
A. Data Exploitation/Collation: Understand need to organize data effectively to analyze it properly.
B. Issue/Problem Development Techniques:
1. Issue Restatement: Understand how to paraphrase an issue for more effective problem solving.
2. Evidence Evaluation: Explain when and how to weigh evidence and prove skill in doing so.
3. Assumptions Check: Describe the nature of assumptions, their impact on decision-making and why we need to find and explicitly state them.
4. Denial and Deception Check: Describe the elements of denial and deception and their impact on analysis.
C. Visualization Techniques
1. Link Analysis: Describe the nature of associations and how analyzing these can give evidence or leads in conspiratorial operations.
2. Pattern Analysis: Understand the types of patterns that may occur and why or how these patterns may aid in developing indicators and warnings.
3. Timeline Analysis: Demonstrate the utility of timelines as a marshaling tool.
4. Commodity Flow Analysis: Demonstrate the efficacy of following movements of things in relation to covert activities.
C. Alternative Analysis Techniques:
1. What If?: Discuss how unlikely events which would have a major impact should be considered.
2. Analysis of Competing Hypotheses: Understand the ability to use Analysis of Competing Hypotheses as an analytic method.
3. Team A – Team B: Explain how using teams of analysts to argue opposing viewpoints on an issue can be effective in viewing alternatives.
4. Devil’s Advocacy: Describe how Devil’s Advocacy can be used to uncover analytic alternatives.
5. Pre-Mortem Assessment: Assess what may occur in the future should your findings be incorrect.
VII. Analytic Issues
A. Collector/Analyst Integration: Explain role of collectors; how to find gaps in evidence and work with collector to close gaps.
B. Analytic Databases: Describe available analytic databases and how they can be used.
C. Analytic Software: Describe available analytic software and prove how it can be used.
D. Ethics within Intelligence: Examine the necessity of ethical behavior within the intelligence profession.
E. Analytic Outreach and Resources: Describe varied ways in which analytic outreach can be affected, including resources available in open source.
F. Customer Engagement: Understand the importance of knowing your customer and learning his/her needs.
G. Analytic Pitfalls: Describe examples of historic pitfalls in analytic thinking and suggest methods to avoid these.
VIII. Argument Mapping
A.      Students examine argument mapping producing "boxes and arrows" diagrams of reasoning, especially complex arguments and debates. Argument mapping improves the student's ability to articulate, comprehend and communicate reasoning, thereby promoting critical thinking.
B.       Students will use argument mapping graphical methods to display the structure of reasoning and argumentation.  The technique is essential for advanced critical thinking.  Without mapping, it is very hard to be clear about the structure of evidence; and without such clarity, critical responses usually misfire. 
1.       Mastering the art of argument mapping helps students build general reasoning and critical thinking skills.  
2.       Produce clear, strong, well-organized arguments.
3.       Communicate your reasoning to the class.
4.       Use mapping to evaluate reasoning.
5.       Use mapping to resolve disagreements rationally. 
6.       Use mapping to make better decisions.
IX. Case Studies
A. Case studies 1-3 analytic tradecraft skills in a simulated real-world environment
B. Case studies 1-3 presentation skills in a simulated real-world environment.
The course runs over five consecutive days covering Monday through the Friday evening 5PM.  Students are expected to attend each hour of each day since the course is comprehensive with each day building upon the next. Days start at 7:45AM AM and run to 5PM. Breakfast, lunch, and afternoon snacks/tea is provided.

Lunches are usually working lunches. Class minimum is 10 with a maximum of 25.  Students who complete the course will be certified as Cyber Intelligence Analyst. 40 CPEs awarded for the course. This course is highly specialized following intelligence community tradecraft. You won’t get this at SANS. You won't get this anywhere but from Treadstone 71. If you want purely technical, then this is not the course for you. If you want tradecraft that lays the foundation for a solid program, education that creates a lasting impact, then this is the course for you.


Course books and manuals will be provided to students upon accepted enrollment. This course follows traditional intelligence community tradecraft. Treadstone 71 has been teaching cyber intelligence courses in various forms for six years. From academic settings and corporate environments to government facilities. Our customers include some of the largest firms in the world many of whom are part of critical infrastructures recognizing the need to learn how to create intelligence (www.treadstone71.com). We support our training with onsite consulting services that teach you how to create a sustainable program aligned to stakeholders. Ultimately, we teach you what most vendors cannot or will not – how to fish for yourself.

Send an email to osint@treadstone71.com from a corporate account to validate course eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo and the like).

Course Fee, Course Lab, and Materials Fee (includes books, templates, structured techniques application, etc.).1
$4990.00 required by TBD DATE, before course start.

This course combines lecture, research, and hands-on team assignments. Students need to bring a laptop (PC or MAC) that does not have corporate controls (tablets will not suffice). PC works best.
Course material is not for resale or commercial use outside the end user license agreement. Course material may not be used for competitive purposes.
https://cybershafarat.com/2016/07/31/intelligenceanalysis/

You must attend the full class in order to receive all course material and the certification. Certification is granted after completion of course instruction and hands-on application of the concepts in 3 to 4 team exercises. If a student leaves the class prior to course completion, neither the certification is granted nor is the course material covered after the student leaves made available.  Lectures and associated material is posted each day after each lecture. This method supports the student in a just-in-time manner. This method ensures full understanding of the material without discovering course plot lines until the proper time. The course is architected to support a particular process flow and learning method.
 
Registration     Pay by DATE TBD

TBD     $4,990.00
 


Event Details

DATE TBD. 7:45AM - 5PM Monday through Thursday. 7:45AM - 3PM Friday.

Laptops without corporate controls required.  Personal laptops allowed.  Administrative access required.  Pre-requisites - Strong understanding of the Internet and web browsers. MAC or PC is fine but PCs preferred. Tablets will not work.

All students need to take the below Myers-Briggs personality test prior to the class.  This may be performed here:  www.humanmetrics.com/cgi-win/jtypes2.asp

Target audience:  CISOs, SOC Managers, Cyber / Information Security VPs, Directors, Analysts, Intelligence analysts, law enforcement, Intelligence Community, and those wishing to learn proper methods of analysis.

No refunds allowed after DATE TBD. Refunds are minus processing fees. Please read the course end user license agreement:

Course EULA



 
 



online registration software provided by: PlanetReg
2017 Hemko Systems Corp. All rights reserved. Unauthorized use prohibited.