Strategic Intelligence Analysis - Estimative and Warning Intelligence - 10 Weeks - Intense and Rewarding
From adversary cyber warfare methods to building your intel program
Create models on your adversary - their capabilities, intent, and motivations.
This is the part 1 instruction lays out the roadmap for a mature cyber intelligence program
An in depth look at the different types of analysis and how they work in intelligence analysis.
This section covers the functions and capabilities for an essentional cyber intelligence program.
Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time
Cognitive and Information Warfare tactics, techniques, and methods from the Chinese Perspective
Cyber Cognitive Warfighter
Cognitive Warfare Some definitions and concepts - Cyber Psyops
Using your knowledge of stakeholders, adversaries, and intelligence requirements, create a collection plan and manage it!
What are color revolutions and what role does cyber cognitive warfare play in them.
Weaponizing Theories to Divide
The building blocks of intelligence analysis and the pitfalls you may encounter
Cryptocurrency Certified Cyber CounterIntelligence Analyst - AI-Infused. Counter Disinformation, Misinformation while building Cyber CounterIntelligence Plans to Subvert the Adversary
Applying Cyber to the FBI Counterintelligence Program - Cointelpro - Cyber Psyops
Normally well over $5k! Signup now!
Cyber Intelligence + Counterintelligence Bundle Certified Cyber Intelligence Analyst + Certified Cyber Counterintelligence Analyst (On-Demand) Get Two Flagship Courses. One Bundle. Full-Spectrum Intelligence Tradecraft.
Cyber Intelligence Tradecraft, Certified Cyber Intelligence Analyst, Strategic Intelligence Analysis
The training explores the evolving landscape of cyber warfare, emphasizing its increasingly complex strategies and challenges.
Companies and the DOD have complex supply chains that includes weapons systems and goods.
Cyber Cognitive Warfighter - Denial and Deception
CounterIntelligence and Deception - Dirty Tricks used online
Information Warfare, Types of Disinformation, and Disinformationists
Cyber Intelligence Cert and a sneak preview of Cyber CounterIntel, Cognitive Warfare, and Cyber Intelligence Basics
Understanding TaHiTI and using MaGMa
Generative AI - Cyber CounterIntelligence Tradecraft - Counter Disinformation, Misinformation while building Cyber CounterIntelligence Plans to Subvert the Adversary
Build your intelligence requirements to effectively address stakeholder needs. Learn the right way, here!
Grey zone activities, cognitive warfare actions, info warfare, cyber psyops, & primary APTs
Measuring Iran's Cyber Capability with STEMPLES Plus
Learn the MBTI and how to understand and influence your adversary personas
Learn how to inform quickly with clear, concise, complete, usable, relevant and timely intel
Structured analysis is a mechanism by which internal thought processes are externalized systematically and transparently so that they can be shared. We continually enhance existing techniques while adding new options.
Build and Enhance Your CTI Program - Intensive and In-depth Hands-on - 10 Additional Lectures with Templates and Examples - Learn and Build at the same time
On Demand - Cyber Intelligence Tradecraft Cyber Intelligence Training Course Newly extended and updated content with Generative AI
Guidelines that ensure the continuity and recovery of critical data, systems, and processes.
Ensuring operational security when using personae to passively collect on your targets.
Cyber psyops - psychological tactics, techniques in the digital realm to influence or manipulate
Learn how Russians examine adversaries in cyber HUMINT analysis
Cognitive and Information Warfare tactics, techniques, and methods from the Russian Perspective
Cognitive and Information Warfare Methods with a focus on their idea of Information Alibi
A historical overview of Russian advanced persistent threat groups, their capabilities, timeline
A strategic review of Russian STEMPLES Plus their ability to execute offensive cyber operations
Learn how to assess your adversary strategically with STEMPLES Plus
Expanded attack surfaces leads to extend cyber attacks
How best to understand your leadership and their knowledge of cyber intelligence.
The core of your analysis is based on your evidence.
What is it? How to recognize traits? Maladaptive modes and manipulation
The Dark Triad is made up of three traits: Machiavellianism, Narcissism and Psychopathy. They are considered to be fairly prevalent in the world of work. Researchers have linked these behavioral traits with the process of acquiring of leadership. The dark triad has been found to be particularly highly represented in more senior roles, including the C-suite. In fact, some researchers have put the proportion of CEOs with clinically significant levels of psychopathic traits as high as 20%.. We see the dark triad as incomplete and have added schadenfreude as the fourth area of measurement, representing the Pitch-Black Tetrad.