Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to Threat Intelligence
- Concepts of Intelligence
- Understanding Cyber Threat Intelligence
- Overview of the Threat Intelligence Lifecycle and Frameworks
Cyber Threats and the Kill Chain Methodology
- Understanding Cyber Threats
- Comprehending Advanced Persistent Threats (APTs)
- Understanding the Cyber Kill Chain
- Recognizing Indicators of Compromise (IoCs)
Requirements, Planning, Direction, and Review
- Assessing the Organization’s Current Threat Landscape
- Understanding Requirements Analysis
- Planning the Threat Intelligence Program
- Securing Management Support
- Assembling a Threat Intelligence Team
- Overview of Threat Intelligence Sharing
- Evaluating the Threat Intelligence Program
Data Collection and Processing
- Overview of Threat Intelligence Data Collection
- Overview of Collection Management for Threat Intelligence
- Overview of Threat Intelligence Feeds and Sources
- Understanding the Collection and Acquisition of Threat Intelligence Data
- Comprehending Bulk Data Collection
- Understanding Data Processing and Exploitation
Data Analysis
- Overview of Data Analysis
- Understanding Data Analysis Techniques
- Overview of Threat Analysis
- Understanding the Threat Analysis Process
- Overview of Fine-Tuning Threat Analysis
- Understanding Threat Intelligence Evaluation
- Developing Runbooks and a Knowledge Base
- Overview of Threat Intelligence Tools
Intelligence Reporting and Dissemination
- Overview of Threat Intelligence Reports
- Introduction to Dissemination
- Engaging in Sharing Relationships
- Overview of Sharing Threat Intelligence
- Overview of Delivery Mechanisms
- Understanding Threat Intelligence Sharing Platforms
- Overview of Legal Acts and Regulations Governing Intelligence Sharing
- Overview of Threat Intelligence Integration
Requirements
a:0:{}
21 Hours