Intelligence Community Tradecraft Training Coming to Amsterdam

Treadstone 71 is bringing two classes to the Amsterdam, Netherlands area November 1-5 and November 8-12, 2021. 40 CPE each class.

#Amsterdam #Netherlands #Cyber #Intelligence #CounterIntelligence #InfluenceOperations

The first class is the intelligence community focused Cyber Intelligence Tradecraft, Certified Cyber Intelligence Analyst course cover the full intelligence lifecycle with real-world, real-time open source investigations, collection planning, collection, the hands-on use of structured analytic techniques, methods of analysis, analytic writing and presentation.  This course helps you build a proper intelligence organization covering strategic, operational, tactical, and technical intelligence through reporting and briefing.

The course is discounted from $5,899 to $3,700 with a buy two get one student enrollment free making the price under two thousand five hundred US dollars. Students receive course material from the course author, books, and a true learning experience.

Target audience (who should attend):

This course is intended for

Intelligence analysts, open-source intelligence collectors, researchers, cyber risk management professionals, incident response leadership, security operations leadership, CISO, CIO, students, cybercrime investigators, analytic report writers, recipients of internal and external intelligence (critical), curious professionals wishing to learn cyber intelligence tradecraft and intelligence strategies.

Requirements (knowledge pre-requisites)

Students should be familiar with Internet browsers, Office 365, general intelligence concepts

Hardware/Software Requirements

Students should have

-Laptop with administrative access, 8GB RAM, 100GB free hard drive space, Windows operating system works best but Mac with a VM for Windows works as well.

The second course is the Certified Cyber CounterIntelligence Analyst – Influence Operations. Certified Cyber CounterIntelligence Analyst – #Amsterdam

The course focuses on individual research and group discussion to explore the world of cyber counterintelligence, and where applicable, make use of the student’s ability to do independent thinking and analysis of in-class problems assigned through weekly discussion threads. This course focuses on open source intelligence and adversaries while creating online personas to assist in data collection and information extraction. This introductory course examines open-source intelligence collection as well as the availability and use of OSINT tools. Students will be able to understand the use methods of only anonymity, the fundamentals behind cyber persona development, enrollment in various social media sites and applications, and how these current methods can be employed in their organizations to assist in operational cyber security, their defense against adversaries, and passive data collection. The establishment of cyber personas takes patience and time to create a credible resource. Parallel activities occur through the outline above. Treadstone 71 maintains separation from the client as required maintaining confidentiality of methods and processes.

What we cover non-inclusively:

Cyber Infiltration, Information Operations, Information Support Operations National Counterintelligence Strategy, Standard Glossary and Taxonomy, Mission-Based Counterintelligence, Counter Collection and Anticipation, Denial and Deception, Counter-Denial and Deception, Cyberspace, Open Source Intelligence, Methods of collection, Specific tools, Social media sites, and enrollment, Methods of Social Media Research, Tools and Techniques, Social media demographics, Establish Priority Intelligence Requirements, Establish Information Requirements, Cyber Target Acquisition and Exploitation, Validation of target, Identify active adversary campaigns, Intent, Motivation, Goals, & Requirements, Passive data collection, Campaign development, Target sites, Enrollment, Tactics, techniques, and procedures, Intent, motivation, goals, and requirements, Vectors of approach, Courses of action, Elicitation and exfiltration. Generative Adversarial Networks – Deep Fakes. Perception as Deception, Social Psychology, Differences in Culture, Diversity, Hofstede Dimensions, Social Psychology, Reciprocity, Consistency, Social validation, Liking, Authority, Scarcity, Big 5 Theory of Personality, Information Warfare and Cyber Psychological Operations, Target analysis and message manipulation where applicable, Persona creation, establishment, maintenance, expansion (depending upon taking Cyber Intelligence Course), Data collection – recycle for Cyber CI updates/improvements, Authoring of blogs and articles for influencing, Placement of specific concepts and phrases. Myers-Briggs with the Evil Side and Under Pressure manipulation and much more.

Target audience (who should attend):

This course is intended for

Intelligence analysts, open-source intelligence collectors, researchers, cyber risk management professionals, incident response leadership, security operations leadership, CISO, CIO, students, cybercrime investigators, analytic report writers, recipients of internal and external intelligence (critical), curious professionals wishing to learn cyber intelligence tradecraft and intelligence strategies.

Requirements (knowledge pre-requisites)

Students should be familiar with Internet browsers, Office 365, general intelligence concepts

Hardware/Software Requirements

Students should have

-Laptop with administrative access, 8GB RAM, 100GB free hard drive space, Windows operating system works best but Mac with a VM for Windows works as well.

(Vaccinations required for the classes)