The Treadstone 71 Cyber Intelligence course examines Sherman Kent’s Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in organizations, businesses, and governments at the completion of this course and, use of our advisory services.

Corporations and other private sector agencies and organizations, increasingly aware of cyber threats, are adding departments and employees to help anticipate and fight cybercrimes, hacktivists, state and non-state actors. This can cost clients more than €8 million per day. Clients learn the cyber intelligence lifecycle.Clients study the role and value of cyber intelligence relative to their organization. Clients develop skills in online targeting and collection, in modern organizations, businesses, and governments.Clients learn the methods of their adversaries.

  • The services uses traditional intelligence tradecraft adopted for the Internet.
  • Clients understand the extent and depth of their Internet attack surface.
  • Why do we need skills in cyber intelligence?

Today we deal with data and data points. Methods of analysis are not used nor understood. Information Technology staff struggle delivering actionable information useful to organization leadership. In fact, the concept of what is actionable is difficult for IT staff to articulate. Below are current deficiencies organizations face understanding the data they receive and do not receive:

  • Data is technical in nature.
  • Data is dictated by nuances and bias of the technologies in place.
  • Data is used for detection.
  • Data is not effectively organized for analysis.
  • Analysis is limited to technical trending and patterns.
  • Analysis, if it occurs, does not follow rigor and standard methods.
  • Reporting to senior leadership does not address their concerns and needs.
  • Metrics are not actionable, timely or accurate.
  • Personal agendas are part of the reporting.
  • Alternatives are not considered.
  • Analytic bias are unconsciously included in reports skewing the results.
  • There is an unwillingness to consider other judgments.
  • Outside experts are not used.
  • Responsibility for the judgment(s) is not collective.
  • Sources are not validated for credibility.
  • Sources are not verified for relevance.
  • Data and information gaps are not understood or communicated.
  • Concepts surrounding critical thinking are foreign to IT organizations.
  • Admission of mistakes is limited and/or hidden.
  • Data and information is not usable or complete.

Cyber Intelligence Training and Services ensures clients:

  • Identify the differences and intersections between open source data, open source information and open source intelligence
  • Understand the role and value of cyber intelligence relative to online targeting and collection, in modern organizations.
  • Understand the use of online anonymity
  • Understand their Internet attack surface:
  • Methods to remediate attack surface issues
  • Step by step methods to implement the program
  • Ideas for policy and procedure changes
  • Integration with traditional technical penetration testing and threat vulnerability assessments
  • New methods that identifies least path of resistance
  • Understand collection and analysis of online human intelligence, geospatial information, imagery intelligence, and cyber intelligence (all source)
  • Know the fundamentals behind cyber intelligence collection and analysis
  • Deliver accurate reports on time with complete data
  • Remove bias from reporting
  • Build rigor and stand methods of intelligence into their programs
  • Quickly examine the data for new targeting and potential immediate recommendations and/or opportunities
  • Develop methods for critical thinking
  • Build skills and capabilities in OSINT tools for data collection
  • Move from see, detect and arrest to prevention and prediction
  • Align technical with social networking data.
  • Create information of value
  • Deliver actionable intelligence that is accurate and complete
  • Understanding link, trend, pattern, tendency, and anomaly analysis
  • Develop capabilities that anticipate adversarial actions
  • Reduce analytic cycle time
  • Provide leadership with recommendations and opportunities
  • Deliver the bottom line up front each time, every time

Contact Treadstone 71 today –info@treadstone71.com

http://www.treadstone71.com

  • Course from $1,600.00 to $10,000.00
    • Fees Course fees are variable depending upon number of students.
    • Course fees subject to change and are demand driven
    • Competitors wishing to take this course:
      • $100,000.00 per course plus expenses
      • NDA required
  • Executed NDA required for the syllabus and other course information
  • Email / phone calls for valid students must come from a non-public account (no Yahoo, Gmail, Hotmail, etc.)
  • Course will not be taught to competitors or adversaries (of course)
  • Treadstone 71 reserves the right to select students based upon the above and other criteria
  • Course scheduled based upon demand – Locations based upon demand

“The Cyber Intelligence Training delivered and created by Jeff Bardin adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence, and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step, and a counter intelligence-contributing arm of your larger team.  – StudentFortune 100 Company”