• Online, Instructor-Led
Course Description

The Personas and OPSEC course covers methods of creating personas, the use of character archetypes, operational security in browsers, methods of OPSEC to use, as well as character generation using adversary tools. A must have training for anyone looking to perform passive collection in hostile open sources.

Learning Objectives

We explore the tools used in OSINT by hackers from adversary countries. Students learn their usage, methods, tactics, and sites they regularly visit. From nation-state threat actors to cyber criminals, the course includes hands on setup and proving of browser configuration, extension use, and container builds. Students leave with the confidence that their collection activities are always secure. No leakage of any type. Passive collection is, by nature, risk adverse. Create rules-of-engagement aligned to legal needs and corporate risk appetites. Ensure your data maintains provenance with a patient and pragmatic approach to data collection. Perform initial data reviews for credibility and source analysis for validation. Keep your collection relevant to your intelligence requirements. This course follows a crawl-walk-run in-class methodology with hands-on validation of skill. Each student walks away with ready-built, proven configurations they can use on day one. We also provide ROE and RACI(S) examples for collection and analysis. This course is for any organization who needs to up their skills. Enhance your cyber intelligence teams with this 3-day intensive course from Treadstone 71.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • All-Source Analysis
  • Collection Operations
  • Cyber Operations
  • Training, Education, and Awareness
  • Knowledge Management

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.