Treadstone 71’s New Intelligence Professional Training Roadmap
- Certified Cyber Intelligence Professional
- Certified Cyber CounterIntelligence Professional
The Intelligence Professional Roadmap details the training program covering cyber intelligence and counterintelligence necessary for today’ threat intelligence professional. We continue to lead the market in targeted, highly focused, and relevant education. The training covers 28 days of intensive and in-depth education directly aligned to proven methods starting in 2004. Students earn 300 CPE in a program that may be completed in 1 or 2 years. The program blends in-person training with online exercises and narrative video. The full program teaches students effective methods of planning, execution, and management covering the discipline of intelligence. The program is the logical next step for the industry as organizations mature in cyber and threat intelligence.
Treadstone 71 Intelligence Professional – Certified Cyber Intelligence Professional
We now offer a complete end-to-end, deep dive education and training program for cyber intelligence and counterintelligence professional. The new program for cyber intelligence, Certified Cyber Intelligence Professional starts with Strategic Intelligence, Analysis, Forecasting, Estimative and Warning Intelligence. The Strategic Intelligence Analysis course follows the iterative processes of the intelligence lifecycle. Strategic analysis requires a breakdown of the complexity’s analysts face during data examination.
Treadstone 71 Intelligence Professional – Certified Cyber CounterIntelligence Professional
The Certified Cyber CounterIntelligence Professional program follows the same proven format as the Certified Cyber Intelligence Professional. Students use the skills developed in the cyber intelligence program as a foundation to execute counterintelligence operations against adversaries with minimum risk. We start this program with a course on creating and maintaining an environment for Operational Security using various methods to maintain the anonymity of technical platforms. Students learn how to deploy, use, and vary OPSEC tools and methods to deter the adversary and deny identification.
Want to learn more?