331-999-0071

Cyber Intelligence & Cognitive Warfare Courses

Online and In-Person 

Înscrieți-vă aici

Treadstone 71 NATIONAL INITIATIVE FOR CYBERSECURITY CAREERS AND STUDIES

NICCS, NATIONAL INITIATIVE FOR CYBERSECURITY CAREERS AND STUDIES

Antrenament de război cognitiv

The new course that centralizes information operations through cognitive methods. We provide hands-on learning and real-world execution using unique techniques taken from both allies and adversaries.

We will cover concepts in Cognitive Warfare, Gray Zone Tactics, Disinformation, Influence Operations, Information Operations, Color Revolutions, Neuro-Linguistic Program, Private Intelligence Firms, Psychological portrait according to the method of 7 radicals and more. We include review of cognitive warfare approaches, a potential framework, historical examples, rational processes, bias in perception and cognition, decision making and time pressures, domains of conflict and combatants, factors influencing decisions, speed and overload, manipulating situational awareness, inducing behavioral change using deception, distraction, distrust, chaos, and confusion. Students learn to assess adversaries for susceptiblity to cogntive weapons and what to observe for potential impacts. Students will learn methods of deception to deceive adversaries, distraction tactics, content creation for distrust, as well as methods of deployment. These methods are included in student created cognitive campaigns that are continuous from multiple vectors. Students will learn cognition of targets while understanding worlds of social media, information, intelligence, and other online vectors. We also cover the issues associated with measuring campaign effectiveness and influence analysis

Validated and registered students will receive login and preparation information 1 week prior to class start.

Corporate accounts are not Gmail, Hotmail, Yahoo, Mail, Hushmail, Protonmail, and the like). Treadstone 71 reserves the right to restrict course registration based upon certain risk factors. This course presents the student with foundational concepts and processes in the discipline of cyber counterintelligence with a focus on cyber counterintelligence missions, defensive counterintelligence, offensive counterintelligence, and counterespionage as these realms apply to traditional tradecraft, and how they are or will evolve into the cyber domain. The course includes a very different approach to counterintelligence using models exhibited online over the past few years to steer the conversation to the desired outcome

Enrollment Means Training EULA Acceptance – Strictly Enforced

Intelligence Tradecraft Operator Training - Cyber Cognitive Warfighter

The course covers operational security methods, online anonymity, persona creation and management with Myers-Briggs, the Big 5, the Dark Triad/Pitch Black Tetrad, the Psychological Techniques of the Seven Radicals, the Nine Enneagram Type Descriptions as they relate to personas and cyber HUMINT tactics through campaign development, management, and execution. Additionally, the course includes adversary targeting with cyber D3A/F3EAD and establishing PIRs through the execution of open source and darknet collection. Other material covered: Information warfare, counterintelligence deception methods, conspiracy theories, the use of ‘cyber’ color revolutions, Russian/Chinese/Iranian Cyber Warfare models, and cyber psychological operations, setting up and executing cognitive warfare campaigns.




As technology constantly and rapidly changes, so does the way our information is attac alm but in human intelligence gathering, the lengths people will go to obtain information. Treadstone71 Cyber Intelligence training courses allow professionals on all levels, the ability to learn methods, techniques, and tools; to not only collect information, but to recognize and counter the gathering, analytics, and critical thinking skills used in intelligence and denial, and deception. The hands-on case studies, scenarios, and team presentations in our cyber intelligence training courses provide the ability for the extensive comprehension necessary to strengthen both your personal and professional intelligence capabilities.

Register here for online and in-person courses

Teorii ale conspirației - Teoriile de a diviza în arme

Într-o inversare a raționamentului științific convențional, dovezile împotriva teoriilor conspirației sunt adesea interpretate ca dovezi pentru acestea, deoarece dovezile sunt interpretate ca decurgând din conspirația în cauză.

Conspiracy Theories are commonplace today. Or more importantly, they were always there but now they have become mainstream.

Oamenii – inclusiv teoreticienii conspirației înșiși – nu fac decât să anuleze aceste convingeri drept „nebuni”. Cu toate acestea, ele pot provoca daune de durată.

The psychology behind conspiracy theories and why people cling to them is so important but often overlooked. We should know how to tackle this, but we do not yet.

Many argue that we were so complacent when it comes to conspiracy theories that it allowed Donald Trump to win support and end up becoming President. We underestimated the influence then, and probably still is now.

Oamenii vulnerabili au mai multe șanse să creadă aceste teorii, așa că trebuie să ne asigurăm că nu minimizăm influența și evidențiem riscurile asociate cu acestea.

Deși internetul a permis ca teoriile să se răspândească mai rapid și mai larg, ne permite, de asemenea, să fim mai critici la ceea ce citim și credem.

Conspiracy theories have been around for centuries. In the last few decades, their influence has remained much the same, despite them seeming more widespread.

Training EULA

Cyber Militias - Rapid Organizing and Execution Against Nation-State Aggression

This course combines certain aspects of our cyber intelligence, counterintelligence, influence operations, and cyber operations development training. The course follows traditional tradecraft within the intelligence and counterintelligence domains while including near-current influence operations focusing on disinformation with conspiracy theories, and the rapid constitution of hacktivist and proxy cyber operations groups. This is an intense course that covers six days of training and hands-on case studies. We need six days to cover the material, address case study needs, and see a level of results from planning execution. The course works in a live online environment using operational security mechanisms to maintain anonymity. Laptops must have administrative access. Prior to class, an open-source install list is provided to enrolled students. PCs work best or VMs running Windows software.

Some of the areas we cover: 

  • Operational Security – maintaining anonymity online
  • Rapid persona creation for monitoring
  • Cyber Militia RoE -
  • D3A/F3EAD Target acquisition and exploitation 
  • Rapid Training
  • Militia Members Levels of Expertise
  • Țintește și trage
  • Cyber Foreign Legion RoE
  • Socio-cultural / Geopolitical analysis
  • Strategic Dimensions of the Adversary
  • Counter Planning
  • Adversary Targeting Phase - Cyber battlefield(s)
  • Cyber dead drops and covert coms
  • Infiltration and elicitation
  • When you are infiltrated
  • Targeting for trolling
  • Adversary courses of action
  • Adjust your fire
  • A Cyber Foreign Legion
  • Needs – How – Levels of Trust
  • Switch to the alternative ‘frequency’
  • Setting up a crowdsourced-enabled offensive arsenal
  • Weaponizing content 
  • Dezinformarea
  • Need for Polarization (or not)
  • Control the Narrative / Wag the Dog
  • Adjust and Shift
Training Justification Letter
Need to validate training requirements? Try our training jusification letter.

Our course listing (non-inclusive):

Customized training, build-to-order, and targeted adversary training.

  • SCRIEREA ANALITĂ
  • CONSTRUIREA UN PROGRAM DE INTELIGENTE CIBERNICE
  • ANALIST CERTIFICAT CYBER CONTERAINTELLIGENCE - OPERAȚIUNI DE INFLUENȚĂ
  • ANALIST CERTIFICAT CYBER INTELLIGENCE
  • RĂZBOIUL COGNITIV INTRODUCERE
    • Aspecte ale dezinformarii
    • Russian Information Alibi
    • Miliții cibernetice / Legiuni străine cibernetice
    • Hybrid Warfare Putin and Ukraine
    • Războiul informațional rusesc
    • Revoluții de culoare
    • Războiul informațional chinezesc
    • Războiul informațional iranian
    • Advanced Topics – Neuro-Linguistic Programming
  • DEZINFORMAREA, DEZINFORMAREA, ÎNșeCȚIA ȘI CONTROLUL NARATIV
  • INFORMATION OPERATIONS
  • INTELLIGENCE AND COUNTERINTELLIGENCE - CYBERSPACE LIFECYCLE AND OPERATIONS
  • ONLINE - BASIC CYBER INTELLIGENCE TRADECRAFT
  • ONLINE ADVANCED CYBER INTELLIGENCE TRADECRAFT
  • ONLINE ANALYTIC WRITING (REPORTING AND BRIEFS)
  • ONLINE CERTIFIED CYBER COUNTERINTELLIGENCE ANALYST
  • ONLINE CRITICAL THINKING AND COGNITIVE BIAS FOR CYBER
  • ONLINE ENHANCED CRITICAL THINKING AND COGNITIVE BIAS
  • ONLINE ENHANCED STRUCTURED ANALYTIC TECHNIQUES
  • ONLINE INTERMEDIATE CYBER INTELLIGENCE TRADECRAFT INTELLIGENCE
  • ONLINE STRATEGIC INTELLIGENCE ANALYSIS
  • ONLINE STRATEGIC INTELLIGENCE ANALYSIS PLUS BUILDING AND ENHANCING YOUR CTI PROGRAM
  • ONLINE THREAT HUNTING WITH TAHITI AND MAGMA
  • ANALIZA INTELIGENTEI STRATEGICE

Contactați Treastone 71

Contactați astăzi Treadstone 71. Aflați mai multe despre ofertele noastre de analiză țintită a adversarului, antrenament de război cognitiv și informații comerciale.

Contactați-ne astăzi!