Cybersecurity career intelligence
Get weekly cybersecurity career intelligence
© 2026 Bespoke Intermedia LLC
Founded by Julian Calvo, Ed.D. · Cybersecurity career intelligence · Est. 2024
Primary-source-grounded cybersecurity course
A primary-source-grounded six-module path into cyber threat intelligence work: the analytic frameworks (Diamond Model, Kill Chain, ATT&CK), the structured analytic techniques from intelligence tradecraft, and the CTI career ladder.
Threat Intelligence Fundamentals is a 6-module cybersecurity course for SOC analysts, incident responders, and security engineers moving into cyber threat intelligence (CTI) roles. Every module is grounded in primary-source frameworks: the Diamond Model of Intrusion Analysis (Caltagirone, Pendergast & Betz 2013), the Lockheed Martin Cyber Kill Chain (Hutchins, Cloppert & Amin 2011), MITRE ATT&CK Enterprise v15, STIX 2.1 and TAXII 2.1 (OASIS standards), Heuer's Psychology of Intelligence Analysis (CIA 1999), and Heuer & Pherson's Structured Analytic Techniques (2014). The course covers strategic, operational, and tactical CTI; how to write a finished intelligence product an executive will read; how to use STIX bundles to share indicators across organizations; and how the Traffic Light Protocol (TLP) governs information sharing. Designed by Julian Calvo, Ed.D. in Applied Learning Sciences (University of Miami, 2026).
The course sequences six modules around the intelligence lifecycle as defined in tradecraft literature: requirements, collection, processing, analysis, dissemination, feedback. Each module pairs a primary-source standard with a hands-on artifact: read the standard, write the analytic product the way the intelligence tradition expects to see it, evaluate the product against an analyst-checklist drawn from Heuer (1999) and CIA's analytic standards. The pedagogical pattern follows Kolb's experiential learning cycle (1984): concrete intelligence task, structured reflection against a tradecraft standard, abstract conceptualization through the framework, then active experimentation with a real CTI source. Every claim cites a primary-source framework, a peer-reviewed paper, MITRE/CISA, or BLS/ISC2. No vendor CTI-platform marketing.
Module 01 · 120 min
The six-step intelligence lifecycle from US national-intelligence tradecraft, why CTI uses the same structure, and what each step looks like at a corporate cyber-threat-intelligence team.
Module 02 · 130 min
Two analytic frameworks for understanding intrusions, why CTI analysts use them as complementary lenses rather than competing ones, and how to apply both to a published APT report.
Module 03 · 130 min
How professional intelligence analysts manage cognitive bias, why Heuer's Analysis of Competing Hypotheses is the foundational technique, and which structured techniques apply to which CTI questions.
Module 04 · 110 min
How CTI moves between organizations in machine-readable form, what the STIX 2.1 data model captures, and how the TAXII protocol structures the exchange.
Module 05 · 110 min
What an executive expects in a strategic CTI assessment, the BLUF (Bottom Line Up Front) discipline, the analytic confidence language, and how to source claims so the consumer can verify.
Module 06 · 100 min
What the CTI analyst, senior CTI analyst, threat intelligence lead, and threat intelligence director ladder looks like, the credentials hiring managers price into the offer, and the BLS, ISC2, and SANS data behind compensation.
This course is for educational purposes only. CTI work involves judgments about adversaries that carry real-world consequences for the targets and the analysts. The tradecraft taught here applies to defensive CTI; readers must consult counsel and ethics review for any work that approaches active engagement with adversary infrastructure. Government-classified CTI tradecraft is not covered. NIST, MITRE, CISA, and CIA materials cited here are public works. STIX and TAXII are OASIS open standards. DecipherU is not affiliated with any CTI vendor or government intelligence service.