Get in Touch

Course Outline

Introduction to Threat Intelligence

  • Concepts of Intelligence
  • Understanding Cyber Threat Intelligence
  • Overview of the Threat Intelligence Lifecycle and Frameworks

Cyber Threats and the Kill Chain Methodology

  • Understanding Cyber Threats
  • Comprehending Advanced Persistent Threats (APTs)
  • Understanding the Cyber Kill Chain
  • Recognizing Indicators of Compromise (IoCs)

Requirements, Planning, Direction, and Review

  • Assessing the Organization’s Current Threat Landscape
  • Understanding Requirements Analysis
  • Planning the Threat Intelligence Program
  • Securing Management Support
  • Assembling a Threat Intelligence Team
  • Overview of Threat Intelligence Sharing
  • Evaluating the Threat Intelligence Program

Data Collection and Processing

  • Overview of Threat Intelligence Data Collection
  • Overview of Collection Management for Threat Intelligence
  • Overview of Threat Intelligence Feeds and Sources
  • Understanding the Collection and Acquisition of Threat Intelligence Data
  • Comprehending Bulk Data Collection
  • Understanding Data Processing and Exploitation

Data Analysis

  • Overview of Data Analysis
  • Understanding Data Analysis Techniques
  • Overview of Threat Analysis
  • Understanding the Threat Analysis Process
  • Overview of Fine-Tuning Threat Analysis
  • Understanding Threat Intelligence Evaluation
  • Developing Runbooks and a Knowledge Base
  • Overview of Threat Intelligence Tools

Intelligence Reporting and Dissemination

  • Overview of Threat Intelligence Reports
  • Introduction to Dissemination
  • Engaging in Sharing Relationships
  • Overview of Sharing Threat Intelligence
  • Overview of Delivery Mechanisms
  • Understanding Threat Intelligence Sharing Platforms
  • Overview of Legal Acts and Regulations Governing Intelligence Sharing
  • Overview of Threat Intelligence Integration

Requirements

a:0:{}
 21 Hours

Number of participants


Price per participant

Upcoming Courses

Related Categories