Cryptocurrency Certified Cyber CounterIntelligence Analyst - AI-Infused

Course Overview- Certified Cyber CounterIntelligence Analyst - Cryptocurrency Investigations
Explore and learn strategies and insights with this comprehensive course designed for professionals seeking to enhance their expertise in cyber counterintelligence, cryptocurrency investigations, and deception planning. This curriculum equips learners with practical tools, techniques, and frameworks to excel in tackling emerging threats and navigating the complexities of modern intelligence and financial investigations.
________________________________________
What You Will Learn-
Section I- Foundations of Cyber Counterintelligence
• Dive into open-source intelligence tools, including an in-depth exploration of Hunchly and its applications.
• Master operational security (OPSEC) principles and learn how to create and leverage your personalized GPT safely and effectively.
Section II- Awareness of Blockchain and Cryptocurrency Fraud
• Gain essential knowledge about OPSEC tailored for blockchain investigations.
• Develop a comprehensive understanding of cryptocurrency fraud schemes and tactics used by malicious actors.
Section IIA- Persona Development and Character Archetypes
• Create and analyze personas to understand adversarial behavior and improve intelligence accuracy.
Section III- Psychological Insights and Behavioral Analysis
• Apply Cialdini’s principles of influence and explore the Dark Triad and Pitch Black Tetrad in cyber operations.
• Examine the destructive potential of MBTI under pressure, focusing on cryptocurrency-related applications.
Section IV- Threat Actor Analysis
• Understand the tactics and motivations of cryptocurrency threat actors, with a special focus on state-sponsored groups like North Korea.
Section V- Tactics and Deception in Influence Operations
• Analyze the dirty tricks, disinformation tactics, and strategic frameworks from “Rules for Radicals.”
• Learn to counteract disinformation and manipulation effectively.
Section VI- Deception Planning and Execution
• Develop sophisticated deception strategies tailored to cyber counterintelligence and cryptocurrency investigations.
Section VII- Offensive Countermeasures
• Explore offensive strategies and ADHD frameworks for proactive engagement in cryptocurrency-focused intelligence.
Section VIII- Structured Analytic Techniques (SATs) for Cryptocurrency
• Apply SATs to streamline blockchain investigations and enhance analytic precision.
Section IX- Cryptocurrency in Russia
• Navigate the unique and rapidly evolving cryptocurrency landscape in Russia, adapting to its continuous operational shifts.
Section X- Chinese Threat Tactics and Procedures (TTPs)
• Investigate Chinese counterintelligence and deception methods to understand their TTPs and counteract their influence.
Section XI- Analytic Writing for Investigations
• Craft impactful, structured analytic reports tailored to cryptocurrency investigations.
________________________________________
Downloadable Resources
Access an extensive library of downloadable content to support your learning and provide practical tools for real-world application.
________________________________________
Course Features-
• Hours of in-depth video content covering the latest in cyber counterintelligence and cryptocurrency investigations.
• Interactive lessons are designed to offer actionable insights and foster hands-on skill development.
• A focus on emerging threats, psychological operations, and geopolitical nuances ensures you stay ahead in a rapidly evolving field.
Expand your skills and enhance your expertise today and gain the tools needed to excel in the ever-challenging domains of cyber counterintelligence and cryptocurrency investigations.

8 to 12 Weeks - On-Demand - Online (Self-Paced)


Your Instructor


Treadstone 71
Treadstone 71

Treadstone 71 is a woman and veteran-owned small business exclusively focused on cyber and threat intelligence consulting, services, and training. We are a pure-play intelligence shop.

Training dates and locations here

Since 2002, Treadstone 71 delivers intelligence training, strategic, operational, and tactical intelligence consulting, and research. We provide a seamless extension of your organization efficiently and effectively moving your organization to cyber intelligence program maturity. Our training, established in 2008, follows intelligence community standards as applied to the ever-changing threat environment delivering forecasts and estimates as intelligence intends. From baseline research to adversary targeted advisories and dossiers, Treadstone 71 products align with your intelligence requirements. We do not follow the create once and deliver many model. We contextually tie our products to your needs. Intelligence is our only business.

  • We use intuition, structured techniques, and years of experience.
  • We supply intelligence based on clearly defined requirements.
  • We do not assign five people to do a job only one with experience.
  • We do not bid base bones only to change order you to overspending.
We do not promise what we cannot deliver. We have walked in your shoes. We understand your pressures.

We are known for our ability to:

  • Anticipate key target or threat activities that are likely to prompt a leadership decision.
  • Aid in coordinating, validating, and managing collection requirements, plans, and activities.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives as related to designated cyber operations warning problem sets.
  • Produce timely, fused, all-source cyber operations intelligence and indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
  • Provide intelligence analysis and support to designated exercises, planning activities, and time-sensitive operations.
  • Develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or no precedent exists.
  • Recognize and mitigate deception in reporting and analysis.
    Assess intelligence, recommend targets to support operational objectives.
  • Assess target vulnerabilities and capabilities to determine a course of action.
  • Assist in the development of priority information requirements.
  • Enable synchronization of intelligence support plans across the supply chain.
  • ...and Review and understand organizational leadership objectives and planning guidance non-inclusively.

Course Curriculum


  Section II - Intro and Awareness
Available in days
days after you enroll
  Section IIA - Personas - Character Archetypes
Available in days
days after you enroll
  Section III - Cialdini - Trolls Plus - MBTI Destructive
Available in days
days after you enroll
  Section IV - Cryptocurrency Threat Actors - NK
Available in days
days after you enroll
  Section V - Dirty Tricks - Rules - Disinformationist
Available in days
days after you enroll
  Section VI - Deception Planning and Methods
Available in days
days after you enroll
  Section VII - Offensive Countermeasures - Crypto Focused
Available in days
days after you enroll
  Section VIII - SATS for Cryptocurrency
Available in days
days after you enroll
  Section IX - Cryptocurrency in Russia
Available in days
days after you enroll
  Section X - Chinese TTPs and Methods
Available in days
days after you enroll
  Section XI - Analytic Writing for Cryptocurrency Investigations
Available in days
days after you enroll
  Downloadable Content
Available in days
days after you enroll

 Name:


 Email:


 Message - I agree to the EULA


Get started now!