Optimal class size is 15-25. Class maximum: 25 Students. Laptops (PC or MAC) without corporate controls. They can be personal devices. Tablets / Phablets will not work. Students need to have administrative access to the laptops.
- Breakfast (continental) and Lunch daily with afternoon snacks / coffee.
- 4 to 4.5 days in length.
- Class start time 7AM – Class end time – 6PM (first two days). Day 3 and 4 – 5PM. Day 5 between 1-3PM
- Class is not taught to competitors. Class is a combination of lecture, hands-on and apprenticeship with 2 specific deliverables.
- http://www.planetreg.com/E31417128106909 – Registration
- Discounted hotel rooms available
- Pay by April 30 – $2,499.00
Pay by May 15 – $2,599.00
Pay by June 1 – $2,699.00
Pay by June 15 – $2,799.00
Pay by June 30 – $2,999.00
“The Cyber Intelligence Training delivered and created by Jeff Bardin will add rapid returns to both Cyber Intel Analysts, and your Security Operations. This very thorough class adequately prepares the student for your Cyber Intelligence function. This class starts with the history of intelligence as a tradecraft and the evolution to the digital corporate world. Along the way, each student receives quality instruction and hands on experience with today’s OSINT tools. This is necessary for anyone new to Cyber Intelligence, and complimentary to any Security Operations within your enterprise. This 4.5-day class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step, and a counter intelligence-contributing arm of your larger team.”
“The class was very detail orientated with a strong focus on the work of Cyber threats and how to better secure your assets against potential attacks. For most scenarios we went through he had an open source tool, or the link to a paid version, to monitor or prevent the attacks from occurring. He was able to answer each and every question asked with specific details, and then some. I would sign up again right away for any other classes offered by Jeff”
“The Cyber Intelligence training offered by Treadstone71 is definitely an outstanding course and I recommend it for any organization looking to implement an intelligence capability. Jeff Bardin is extremely knowledgeable in the intelligence tradecraft and applies it to the cyber realm in a way that is understandable, exciting to learn, and makes it easy to achieve “quick wins” in the organization after completing his class. Jeff provided the class with a multitude of tools, templates, and documents that can immediately be used by any organization focused on intelligence collection and analysis. Jeff arrived well prepared to teach the course and one of the most impressive aspects of the class was that he presented the material in a way that displayed his personal knowledge and experience in the field rather than relying solely on book material. We intend to continue leveraging Jeff’s services as we mature our cyber intelligence capability and highly recommend Treadstone71’s services to any organization.”
This course examines Sherman Kent’s Analytic Doctrine from the cyber perspective as well as the availability and use of OSINT tools. Students will be able to understand the cyber intelligence lifecycle, the role and value of cyber intelligence relative to online targeting and collection, in modern organizations, businesses, and governments at the completion of this course and, use of our advisory services.
Corporations and other private sector agencies and organizations, increasingly aware of cyber threats, are adding departments and employees to help anticipate and fight cybercrimes, hacktivists, state and non-state actors. This can cost clients more than €8 million per day.
The services uses traditional intelligence tradecraft adopted for the Internet.
Clients learn the cyber intelligence lifecycle. Clients study the role and value of cyber intelligence relative to their organization. Clients develop skills in online targeting and collection, in modern organizations, businesses, and governments. Clients learn the methods of their adversaries.
Clients understand the extent and depth of their Internet attack surface.
Why do we need skills in cyber intelligence?
Today we deal with data and data points. Methods of analysis are not used nor understood. Information Technology staff struggle delivering actionable information useful to organization leadership. In fact, the concept of what is actionable is difficult for IT staff to articulate. Below are current deficiencies organizations face understanding the data they receive and do not receive:
- Data is technical in nature.
- Data is dictated by nuances and bias of the technologies in place.
- Data is used for detection.
- Data is not effectively organized for analysis.
- Analysis is limited to technical trending and patterns.
- Analysis, if it occurs, does not follow rigor and standard methods.
- Reporting to senior leadership does not address their concerns and needs.
- Metrics are not actionable, timely or accurate.
- Personal agendas are part of the reporting.
- Alternatives are not considered.
- Analytic bias are unconsciously included in reports skewing the results.
- There is an unwillingness to consider other judgments.
- Outside experts are not used.
- Responsibility for the judgment(s) is not collective.
- Sources are not validated for credibility.
- Sources are not verified for relevance.
- Data and information gaps are not understood or communicated.
- Concepts surrounding critical thinking are foreign to IT organizations.
- Admission of mistakes is limited and/or hidden.
- Data and information is not usable or complete.
Cyber Intelligence Training and Services ensures clients:
- Identify the differences and intersections between open source data, open source information and open source intelligence
- Understand the role and value of cyber intelligence relative to online targeting and collection, in modern organizations.
- Understand the use of online anonymity
Understand their Internet attack surface:
- Methods to remediate attack surface issues
- Step by step methods to implement the program
- Ideas for policy and procedure changes
- Integration with traditional technical penetration testing and threat vulnerability assessments
- New methods that identifies least path of resistance
- Understand collection and analysis of online human intelligence, geospatial information, imagery intelligence, and cyber intelligence (all source)
- Know the fundamentals behind cyber intelligence collection and analysis
- Deliver accurate reports on time with complete data
- Remove bias from reporting
- Build rigor and stand methods of intelligence into their programs
- Quickly examine the data for new targeting and potential immediate recommendations and/or opportunities
- Develop methods for critical thinking
- Build skills and capabilities in OSINT tools for data collection
- Move from see, detect and arrest to prevention and prediction
- Align technical with social networking data.
- Create information of value
- Deliver actionable intelligence that is accurate and complete
- Understanding link, trend, pattern, tendency, and anomaly analysis
- Develop capabilities that anticipate adversarial actions
- Reduce analytic cycle time
- Provide leadership with recommendations and opportunities
- Deliver the bottom line up front each time, every time
Time is of the essence when protecting your organization’s critical information assets against cyber threats. Sign up today for Cyber Intelligence through Treadstone 71.