Cyber Intelligence Tradecraft Certification - Certified Threat Intelligence Analyst
Hoboken, NJ

When TBD
July 15 - 19, 2019
7:45 AM


Hoboken, NJ

Open Map in new window

Already Registered?

Enter your Last Name and Confirmation ID to review your record.

Last Name or Email

Cyber Intelligence Tradecraft Certification - Hoboken, NJ July 15-19, 2019
Certified Threat Intelligence Analyst

Registration Information 

2019 Course Dates - Locations 
Jan 14-18 Cyber Intelligence - Amsterdam, NL - Completed
March 4-8 Cyber Intelligence - Reston, VA - Completed
March 11-15 Cyber CounterIntelligence - Reston, VA - Completed

June 17-21 Cyber Intelligence - Herndon, VA

July 15-19  Cyber Intelligence - Hoboken, NJ
September 9-13 Cyber Intelligence - Zurich, Switzerland
October 7-11 Cyber Intelligence - Ft Myers, FL 
October 14-18 Cyber CounterIntelligence - Ft Myers, FL
November 11-15 Cyber Intelligence - Ft Myers, FL
December 9-11 Cyber Intelligence Collection Manager - Ft. Myers, FL

NEW COURSE - Cyber Intelligence Collection Manager - May 6-8, 2019 - Fort Myers, Florida
Intelligence for the C-Suite (On demand)

Course syllabus and content proprietary to Treadstone 71

Latest student testimonial: 
"With my extensive experience working in the Department of Defense on active duty and federal contractor, this training provided industry professionals with a greater perspective for intelligence analysis. The training taught state of the art concepts and applied them to
real-world scenarios establishing a solid understanding using these intelligence tradecrafts to effectively predict and prevent cyber actors from exploiting their organizations. Individuals new to the cyber intelligence field or professionals who want to fine-tune their skills in the intelligence field should strongly consider this training for any intelligence analyst or security professional."

Program Outline 
The course follows the iterative processes of the intelligence lifecycle while covering non-inclusively:
Anonymity and Passive Persona setup Production Methods Estimation and Forecasting
Collection Methods and Techniques Structured Analytic Techniques – Their use Campaign analysis
Collection Planning, IRs/PIRs/EEIs/Indicators/SIRs Adversary Denial and Deception Types and Methods of Analysis
Collection Process Flow Source Credibility and Relevance Synthesis and Fusion
Collection (OSINT) Tools and Targeting Source Validation Analysis of Competing Hypothesis
Threat Intelligence Denial and Deception Inductive/Abductive/Deductive Reasoning
Most likely Threat Actors Confidence Levels Stakeholder Identification, and Analysis
Access to ThreatStream during the class Types of evidence Analytic Writing, BLUF, AIMS Production Management Forecasting in your writing
Use of Maltego – overview Critical and Creative Thinking STEMPLES Plus
OPSEC – VPNs, Buscador, Authentic8 Silo Cognitive Bias Indicators of Change
OSINT Browser – Oryon C Portable Glossary and Taxonomy Argument Mapping
Proxy Access – the DarkNet What Intelligence Can and Cannot Do Types of Reports
Demonstration – Recorded Future / Intel471 Use of Mitre ATT&CK in Analysis Product Line Mapping
Burn phone setup and use (US Only) ATT&CK in examining patterns and trends Report Serialization, and Dissemination
Open Source Intelligence OSINT ATT&CK in Adversary tendencies Live Case Studies – Class briefs

Lecture, Hands-on, Apprenticeship, in-class exercises, student presentations, analytic products, templates, course material—40 CPEs
All Case Studies use all methods, techniques, and tools referenced in the course material. The Case Studies used are straight from the headlines giving students real-world experience during the class.
All students receive 2 books and 50 plus course documents, VPN, team burn phones, and other course materials.

The course runs over five consecutive days covering Monday through Friday.  Students are expected to attend each hour of each day since the course is comprehensive with each day building upon the next. Days may start at 7:45 AM and may run to 5 PM on M-Th and end on Friday around 2-3PM. Breakfast, lunch, and afternoon snacks/tea are provided. Lunches are usually working lunches. Class minimum is 12 with a maximum of 25. 

Students who complete the course will be certified as Cyber Intelligence Tradecraft Professional. 40 CPEs awarded for the course. This course is highly specialized following intelligence community tradecraft. You won’t get this at SANS. You won't get this anywhere but from Treadstone 71. If you want purely technical, then this is not the course for you. If you want tradecraft that lays the foundation for a solid program, education that creates a lasting impact, then this is the course for you.

Course books and manuals will be provided to students upon accepted enrollment. This course follows traditional intelligence community tradecraft. Treadstone 71 has been teaching cyber intelligence courses in various forms for six years. From academic settings and corporate environments to government facilities. Our customers include some of the largest firms in the world many of whom are part of critical infrastructures recognizing the need to learn how to create intelligence ( We support our training with onsite consulting services that teach you how to create a sustainable program aligned to stakeholders. Ultimately, we teach you what most vendors cannot or will not – how to fish for yourself.

Send an email to from a corporate account to validate course eligibility before registration. (Corporate accounts are not Gmail, Hotmail, Yahoo and the like).

Course Fee, Course Lab, and Materials Fee (includes books, templates, structured techniques application, etc.).

This course combines lecture, research, and hands-on team assignments. Students need to bring a laptop (PC or MAC) that does not have corporate controls (tablets will not suffice).

How is this course different from the current Treadstone 71 Cyber Intelligence course?

This course provides definitive sections along the intelligence lifecycle that are in-depth. Students are required to demonstrate understanding and use of collection methods using defined targets and target case studies, understanding and applying analytic techniques, when and how to use analytic techniques and analytic types.Students are presented case studies for analysis, required to use tradecraft methods, and provide written reports in standard analytic format. Students are also required to orally present their deliverables to the class. You will leave this course with the tools, methods, and understanding necessary to enhance your intelligence program.
“The Cyber Intelligence Training delivered and created by Jeff Bardin will add rapid returns to both Cyber Intel Analysts, and your Security Operations.  This very thorough class adequately prepares the student for your Cyber Intelligence function.  This class starts with the history of intelligence as tradecraft and the evolution of the digital corporate world.   Along the way, each student receives quality instruction and hands-on experience with today’s OSINT tools.  This is necessary for anyone new to Cyber Intelligence and complimentary to any Security Operations within your enterprise. This class provides the student with the resources and fundamentals needed to establish cyber intelligence as a force as both a proactive offensive step and a counter intelligence-contributing arm of your larger team.”
 “The class was very detail orientated with a strong focus on the work of Cyber threats and how to better secure your assets against potential attacks.  For most scenarios, we went through he had an open source tool, or the link to a paid version, to monitor or prevent the attacks from occurring.  He was able to answer each and every question asked with specific details, and then some.  I would sign up again right away for any other classes offered by Jeff.”
"Fantastic class that gets to the foundational aspects of traditional tradecraft. We studied hard examining recent attack campaigns. The analysis training prepared me for real-world efforts. Have to say this is one of the best classes I have ever taken, having taken many from SANS.  SANS does not compare. They are more of a class mill today.  The Treadstone 71 course material is unique, focused, and timely."
 “The Cyber Intelligence training offered by Treadstone71 is definitely an outstanding course and I recommend it for any organization looking to implement an intelligence capability. Jeff Bardin is extremely knowledgeable in the intelligence tradecraft and applies it to the cyber realm in a way that is understandable, exciting to learn and makes it easy to achieve “quick wins” in the organization after completing his class.  Jeff provided the class with a multitude of tools, templates, and documents that can immediately be used by any organization focused on intelligence collection and analysis. Jeff arrived well prepared to teach the course and one of the most impressive aspects of the class was that he presented the material in a way that displayed his personal knowledge and experience in the field rather than relying solely on book material.  We intend to continue leveraging Jeff’s services as we mature our cyber intelligence capability and highly recommend Treadstone71’s services to any organization.”

“This is one of the best, if not the best, Cyber Threat Intelligence training course I've attended.”
“This course was excellent. I was concerned coming into it that I would already know all the course material (I have been doing this sort of work for 15 years, specifically the type of work this course covered). As it turns out, it was a good reminder of what I should be doing to improve structure and rigor, and provided good tools, some of which I had not seen before. If I was new to this field, or looking for a good insight into how Intelligence should work (i.e.: most of the rest of the class), I believe this would have provided even more value. I have already recommended it to a couple of my former colleagues in this line of business, and would happily recommend it for future use by ########.”

Breakfast and lunch served daily
Afternoon snack provided

Course material is not for resale or commercial use outside the end user license agreement. Course material may not be used for competitive purposes. 

NOTE: Organizations sending 3 or more students are eligible for other discounts. Contact Treadstone 71 at for more information.

NOTE: CORPORATE PURCHASE ORDERS can be arranged. Please contact us at to begin the process.

You must attend the full class in order to receive all the course material and the certification. Certification is granted after completion of course instruction and hands-on application of the concepts in 3 to 4 team exercises. If a student leaves the class prior to course completion, neither the certification is granted nor is the course material covered after the student leaves made available.  Lectures and associated materials posted each day after each lecture. This method supports the student in a just-in-time manner. This method ensures a full understanding of the material without discovering course plot lines until the proper time. The course is architected to support a particular process flow and learning method.
Registration     Pay by June 30, 2019

Pay by June 30, 2019     $4,990.00
Event Details
July 15-19, 2019
Laptops without corporate controls required.  Personal laptops allowed.  Administrative access required.  Pre-requisites - Strong understanding of the Internet and web browsers. MAC or PC is fine but PCs preferred. Tablets will not work.

All students need to take the below Myers-Briggs personality test prior to the class.  This may be performed here:

Target audience:  CISOs, SOC Managers, Cyber / Information Security VPs, Directors, Analysts, Intelligence analysts, law enforcement, Intelligence Community, and those wishing to learn proper methods of analysis.

No refunds allowed after June 15, 2019. Refunds are minus processing fees. Please read the course end user license agreement:

Course EULA


online event registration system provided by: PlanetReg
2019 Hemko Systems Corp. All rights reserved. Unauthorized use prohibited.
Terms of Service | Privacy Policy | Security