Training
We teach the Intelligence Cycle as a practical framework for handling difficult data and building digital tradecraft. By focusing on how these skills apply in the real world, we help you develop the analytical mindset needed to turn raw information into a strategic advantage. Our courses turn proven field techniques into skills you can use to stay safe, informed, and resilient.
Whether you are a cybersecurity analysts, business, nonprofit, journalist, or someone wanting to better understand the online information ecosystem, our trainings equip participants with the skills they need to achieve their unique goals.
Open Source Intelligence
Our OSINT training covers the full intelligence cycle from safe collection across complex information environments to producing reliable intelligence that informs real-world operations. Walk away with the tools, tradecraft, and techniques to turn raw data into lasting organizational advantage.
Topics include
- Define your audience and collection plan
- Applied threat modeling and managed attribution
- Public records, social media, and illicit networks
- Extract, transform, and load raw data for exploitation
- Evaluate sources and conduct network analysis
- Communicate intelligence to the right audience in the right way
Intelligence Analysis
Our intelligence analysis trainings are designed for professionals seeking to strengthen their analytic capabilities. Participants will explore the intelligence cycle through structured analytic techniques, source evaluation, and the role of cognitive biases in the analytical process. Participants will learn to develop and communicate assessments that meet professional standards.
Topics include
- Fundamentals of Intelligence Analysis
- The Intelligence Cycle
- Assumptions, Biases, & Mindsets
- Structured Analytic Techniques
- Likelihoods and Confidence Levels
Privacy and Safety
Professionals will learn how to interact with the public or stakeholders while protecting themselves and their organization. Participants learn clear, repeatable approaches to threat modeling, risk mitigation, and safeguarding internal systems, along with everyday best practices for staying safe online and in person.