This online Part 2 & 3 course covers the initial aspects of building a proper cyber intelligence program. We begin from nothing supplying guidance proven through program build campaigns across different verticals and four continents. We designed the course to guide organizations in their cyber and threat intelligence program builds through online lectures, demonstrations, and templates covering the full intelligence lifecycle at a minimum. After years of teaching intelligence courses and delivering intelligence programs to clients, Treadstone 71 now offers this step-by-step course. We take students through the strategic planning process, goals and objectives creation, stakeholder analysis, adversary targeting and threat matrices creation, priority intelligence requirements, collection planning, structured analytic technique usage, analysis, maturity assessments, SOP development, threat intelligence platform selection, analytic writing, and dissemination non-inclusively.
Learning Objectives
The program includes instructional videos tied to content with periodic direct access to Treadstone 71 for client deliverable reviews. We supply templates and examples that you can use, change, or get ideas from. Artifacts specifically designed for past clients. The peer-review process follows a standard cycle including comments, suggestions, recommendations, and examples of previously finished products. Treadstone71 also offers regular ‘professor’ office hours for Q&A as requested in Office Hour Packs. The program follows proven methods established over the years while creating intelligence programs. Clients move at a regular pace that corresponds with their internal schedules that Treadstone 71 helps to set up with the client. We offer the program in different definitive sections giving students time to work artifacts, ideas, and the program with their stakeholders. The program also offers the standard Cyber Intelligence Tradecraft Certification training as an add-on. Parts 2 & 3 cover cyber intelligence team functions and capabilities needed to build and run a highly efficient cyber intelligence program.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.