High Level Benefits of the Cyber Intel Course 

The Treadstone 71 Cyber Intelligence course examines Sherman Kent’s Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students are able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in organizations, businesses, and governments at the completion of this course and, use of our advisory services.

Corporations and other private sector agencies and organizations, increasingly aware of cyber threats, are adding departments and employees to help anticipate and fight cybercrimes, hacktivists, state and non-state actors. This can cost clients more than €8 million per day. Clients learn the cyber intelligence lifecycle.Clients study the role and value of cyber intelligence relative to their organization. Clients develop skills in online targeting and collection, in modern organizations, businesses, and governments.Clients learn the methods of their adversaries.

  • The services uses traditional intelligence tradecraft adopted for the Internet.
  • Clients understand the extent and depth of their Internet attack surface.
  • Why do we need skills in cyber intelligence?

Today we deal with data and data points. Methods of analysis are not used nor understood. Information Technology staff struggle delivering actionable information useful to organization leadership. In fact, the concept of what is actionable is difficult for IT staff to articulate. Below are current deficiencies organizations face understanding the data they receive and do not receive:

  • Data is technical in nature.
  • Data is dictated by nuances and bias of the technologies in place.
  • Data is used for detection.
  • Data is not effectively organized for analysis.
  • Analysis is limited to technical trending and patterns.
  • Analysis, if it occurs, does not follow rigor and standard methods.
  • Reporting to senior leadership does not address their concerns and needs.
  • Metrics are not actionable, timely or accurate.
  • Personal agendas are part of the reporting.
  • Alternatives are not considered.
  • Analytic bias are unconsciously included in reports skewing the results.
  • There is an unwillingness to consider other judgments.
  • Outside experts are not used.
  • Responsibility for the judgment(s) is not collective.
  • Sources are not validated for credibility.
  • Sources are not verified for relevance.
  • Data and information gaps are not understood or communicated.
  • Concepts surrounding critical thinking are foreign to IT organizations.
  • Admission of mistakes is limited and/or hidden.
  • Data and information is not usable or complete.

Cyber Intelligence Training and Services ensures clients:

  • Identify the differences and intersections between open source data, open source information and open source intelligence
  • Understand the role and value of cyber intelligence relative to online targeting and collection, in modern organizations.
  • Understand the use of online anonymity
  • Understand their Internet attack surface:
  • Methods to remediate attack surface issues
  • Step by step methods to implement the program
  • Ideas for policy and procedure changes
  • Integration with traditional technical penetration testing and threat vulnerability assessments
  • New methods that identifies least path of resistance
  • Understand collection and analysis of online human intelligence, geospatial information, imagery intelligence, and cyber intelligence (all source)
  • Know the fundamentals behind cyber intelligence collection and analysis
  • Deliver accurate reports on time with complete data
  • Remove bias from reporting
  • Build rigor and stand methods of intelligence into their programs
  • Quickly examine the data for new targeting and potential immediate recommendations and/or opportunities
  • Develop methods for critical thinking
  • Build skills and capabilities in OSINT tools for data collection
  • Move from see, detect and arrest to prevention and prediction
  • Align technical with social networking data.
  • Create information of value
  • Deliver actionable intelligence that is accurate and complete
  • Understanding link, trend, pattern, tendency, and anomaly analysis
  • Develop capabilities that anticipate adversarial actions
  • Reduce analytic cycle time
  • Provide leadership with recommendations and opportunities
  • Deliver the bottom line up front each time, every time

Contact Treadstone 71 today –info@treadstone71.com


  • Course from $1,600.00 to $10,000.00
    • Fees Course fees are variable depending upon number of students.
    • Course fees subject to change and are demand driven
    • Competitors wishing to take this course:
      • $100,000.00 per course plus expenses
      • NDA required
  • Executed NDA required for the syllabus and other course information
  • Email / phone calls for valid students must come from a non-public account (no Yahoo, Gmail, Hotmail, etc.)
  • Course will not be taught to competitors or adversaries (of course)
  • Treadstone 71 reserves the right to select students based upon the above and other criteria
  • Course scheduled based upon demand – Locations based upon demand

“The Cyber Intelligence Training delivered and created by Jeff Bardin adds rapid returns to both Cyber Intel Analysts, and Security Ops Centers.  Each student receives quality instruction and hands on experience with today’s OSINT tools and intelligence tradecraft.  This is necessary for anyone new to Cyber Intelligence, and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step, and a counter intelligence-contributing arm of your larger team.  – StudentFortune 100 Company”

5 thoughts on “High Level Benefits of the Cyber Intel Course 

Add yours

  1. From a student:

    “The class was very detail orientated with a strong focus on the work of Cyber threats and how to better secure your assets against potential attacks. For most scenarios we went through he had an open source tool, or the link to a paid version, to monitor or prevent the attacks from occurring. He was able to answer each and every question asked with specific details, and then some. I would sign up again right away for any other classes offered by Jeff”

    From a SOC Manager:

    “The Cyber Intelligence training offered by Treadstone71 is definitely an outstanding course and I recommend it for any organization looking to implement an intelligence capability. Jeff Bardin is extremely knowledgeable in the intelligence tradecraft and applies it to the cyber realm in a way that is understandable, exciting to learn, and makes it easy to achieve “quick wins” in the organization after completing his class. Jeff provided the class with a multitude of tools, templates, and documents that can immediately be used by any organization focused on intelligence collection and analysis. Jeff arrived well prepared to teach the course and one of the most impressive aspects of the class was that he presented the material in a way that displayed his personal knowledge and experience in the field rather than relying solely on book material. We intend to continue leveraging Jeff’s services as we mature our cyber intelligence capability and highly recommend Treadstone71’s services to any organization.”

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Blog at WordPress.com.

Up ↑

%d bloggers like this: