0 0
Read Time:5 Minute, 51 Second

How is this course different from the Certified Threat Intelligence Analyst – Cyber Intelligence Tradecraft Certification course?

We found a need to assist organizations best understand the strategic functions of intelligence. Although there is some overlap in this course, the course goes into greater depth expanding well beyond traditional IT-type threat intelligence building the foundation for supporting decision-making outside of IT. There is some review for those who have taken previous Treadstone 71 courses but this course is the natural next steps in establishing a resilience, and sustainable cyber threat intelligence program. The course moves the functions and capabilities to a valid corporate asset.

Will the course offer the same types of hands-on exercises that make Treadstone 71 training the gold standard?

We deliver several hands-on exercises complete with templates and examples. Our intent is to send each student back to their corporate environments armed with the knowledge necessary to immediately enhance their existing programs or, start new programs with a foundation rooted in excellence.


Data, Information, Knowledge and Intelligence The Role of Warning Intelligence
Knowledge Generation Key Warning Factors in Preparations
Explicitly versus Tacit Knowledge What Is Warning?
Principles of Knowledge Management Intentions versus Capabilities
Monitoring your Business Environment The function of Warning Intelligence
Analysis Projects Indicators and Indications
Analysis Cycle Strategic versus Tactical Warning
Briefing What is a Warning?
The Management Brief Warning as an Assessment of Probabilities
Starting the Project Warning as a Judgment for the Stakeholder
Project Brief Checklist Indicator Lists: Compiling Indications
Collection Planning Fundamentals of Indications Analysis
Attributes of Sources – Source-Centered Collection Plan Compiling Indications
The Collection Plan Use of Indicator Lists
Segmentation of Sources Extracting Indications Data
Valuation of Sources The Nature of Cyber Indicators
Separating Rumor from Fact Cyber Indications and Warnings
Using Social Media like a Police Scanner The Nature of Cyber Indicators
Monitoring and Verifying Importance of Cyber Indicators
Image Verification Indications Chronology
Video Verification Specifics of the Analytical Method
Using the Crowd Presumption of Surprise
Verification Process and Checklists Scope of Relevant Information
Verification Tools Objectivity and Realism
Intelligence Requirements Need to Reach Immediate Conclusions
Prioritization Inference, Deduction and Induction
Essential Elements of Information Acceptance of New Data
Indicators Understanding How the Adversary Thinks
Specific Information Requirements Consideration of Various Hypotheses
Glossary and Taxonomy How Might they Go to Cyber War?
Mission and Requirements Management Order of Cyber Battle Analysis in a Crisis Situation
Tools to Use Cyber Order of Battle Methods
Data to Collect Analysis of Cyber Mobilization
Iterative and Continuous Feedback Loop Recognition of Cyber Buildup
The Data Collection Plan Preparation for Cyber Warfare
Executing the Plan Key Warning Factors in Preparations
Collection from Friendly or Neutral Sources The preoccupation of Leadership / Stakeholders
HUMINT Cyber Readiness
Free-flow (Cooperation, rules, benefits, risks & issues, analysis) Exercises for Preparation versus Cyber Deployment
Interviewing (Cooperation, rules, benefits, risks & issues, analysis) Magnitude and Redundancy of Preparations
Sampling (Cooperation, rules, benefits, risks & issues) Cyber Wargaming
Networking (Cooperation, rules, benefits, risks & issues) What is a Cyber Wargame
Protecting your Sources Why run a Cyber Wargame
Across Cultural Barriers Objectives
Collecting from Unsuspecting Sources Success Factors
Passive Collection Common flow
Elicitation (Cooperation, rules, benefits, risks & issues) Common problems in setting up and running
Elicitor – Qualities – Cyber Appearance STEMPLES Plus
Collection from Public Domain Social, Technical, Economic, Military, Political, Legislative, Educational, Security
Anatomy of OSINT Plus (Demographic, Religion, Psychological, catchall)
Spelling, Singular/Plural, Acronyms, Jargon, History, Synonyms, Quasi-Synonyms Indicators of Change as Applied to STEMPLES Plus
Applications of OSINT The ambiguity of STEMPLES Plus Indicators
OSINT overload – Focus A Problem of Perception
Collection from Images Considerations in STEMPLES Plus Warning
Picture Analysis The Relative Weight of STEMPLES Plus Factors
How to apply Intelligence from Image Collection Maintaining your STEMPLES Plus Indicators of Change
When to do so Isolating the Critical Facts and Indications
Imagery Intelligence output Guidelines for Assessing the Meaning of Evidence
Collection from Things Hofstede Principles
Back end collection and analysis Hofstede as Applied to STEMPLES Plus
Where to apply the collection Adversary Baseball Cards
When and How to apply the collection Country, Group, Campaign, Individuals
Collection Outsourcing Reconstructing the Adversary’s Decision-making Process
Analysis Benching marking your adversary
Introduction Adversary TTPs
Attributes of strategic analysis Adversary Profiling
Collector – Analyst Relationship Adversary Supply Chain
Collector-Analyst Differences – Corporate alignment – All as one Skills and Education
Strategic Analysis Cycle Tools and Their Application
Anatomy of Analysis Principal Factors in Timing and Surprise
Where, who, when, why, and how Examples of Assessing Timing
Pitfalls Warning is Not a Forecast of Imminence
Common pitfalls in analysis The Problem of Deception
Bias Infrequency and Neglect of Deception
Ethnocentric Principles, Techniques and Effectiveness of Deception
Wishful Thinking Types of Deception
Status quo Countering Deception
Herding Judgments and Corporate Policy
Previous Judgments Facts Don’t “Speak For Themselves’’
Conventional wisdom What Do Top Stakeholders Need, and Want, to Know?
Data and meta data Intelligence in Support of Policy?
Data QA Assessing Probabilities
Data processing and QC Improving Warning Assessments
Data Credibility Factors Influencing Judgments and Reporting
Source Validity General Warning Principles
Data and Source Relevance Most Frequent Impediments to Warning
Scoring Methods
Data Preparation Appendix A – FORMS
Managing incomplete data Key Assumptions
Managing conflicting data Indicators / Observables Matrix
Weighing Data Threat Situational Awareness
Working with experts – Detection Indicators – Threat and Disposition
Data Quantity versus Quality Threat Type – Description – Disposition
Misperceiving Events Priority Intelligence Requirements – Collection Planning
Premature closing Kill Chain Phase
Confusing causality and correlation Types of Analysis
Flawed analogies Decomposition
Functions and Responsibilities Link Analysis
Structured Analytic Techniques Pattern Analysis
Link analysis/network charts Trend Analysis
Timeline/Chronology Technical Baseline
Network Analysis Functional Baseline
Brainstorming Cultural Baseline
Structured Brainstorming Tendency Analysis
Virtual Brainstorming Cultural Analysis
Nominal Group Technique Anomaly analysis
Starbursting Semiotic Analysis
Cross-Impact Matrix Anticipatory Analysis
Morphological Analysis Volatility Analysis
Quadrant Crunching Supply Chain Analysis
Scenario Analysis Recomposition
Mechanics of Scenario Analysis Synthesis
When and why to plan Analyst – Stakeholder Interaction
Success factors Uncertainty
Design principles Decision-making strategies
Attributes of a good scenario Challenges
Flow of a Scenario Exercise Moving towards a Trusted Advisor Role
Pitfalls in Scenario Analysis Cherry picking
Alternative Futures Analysis Yes Manship
Indicators Groupthink
Indicators Validator Compliance Mandatory – Ethics as Identity
Hypothesis Generation Legislation
Formulation and testing Scope of compliance and ethics in analysis
Theories, Forecasts Code of ethics for strategic analysis
Testing Organizing a Strategic Analysis Function
The Multiple Hypotheses Generator Getting started
Diagnostic Reasoning Structure after strategy
Analysis of Competing Hypotheses The right structure enables efficient/effective execution
Argument Mapping Centralized versus Decentralized – a comparison
Deception Detection Organizing a solid team
Key Assumptions Check Design principles
Outside In Thinking Functional and behavioral competency building
Pre-Mortem Assessment Towards a world-class strategic analysis organization
What If? Analysis Five Levels of Strategic Analysis Professionalism
High Impact, Low Probability Profile of an analyst
Devil’s Advocacy Functional competencies
Force Field Analysis Behavioral competencies
Maps Measuring competencies – Competency models
Flow charts Job descriptions and hiring questions
Frequency charts Accountability, Key Activities, Results
Story boards

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
0 %
0 %
0 %
0 %
0 %
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence