Get in Touch

Course Outline

Introduction to Threat Intelligence

  • Core concepts of intelligence.
  • Definition and scope of Cyber Threat Intelligence.
  • Survey of the Threat Intelligence Lifecycle and associated frameworks.

Cyber Threats and the Kill Chain Methodology

  • Analysis of modern cyber threats.
  • Comprehension of Advanced Persistent Threats (APTs).
  • Deep dive into the Cyber Kill Chain model.
  • Identification and interpretation of Indicators of Compromise (IoCs).

Requirements, Planning, Direction, and Review

  • Assessment of the organization’s current threat landscape.
  • Evaluation of specific requirements analysis.
  • Strategic planning for the Threat Intelligence Program.
  • Securing executive management support.
  • Establishing a dedicated Threat Intelligence team.
  • Introduction to collaborative threat intelligence sharing.
  • Periodic review of the Threat Intelligence Program.

Data Collection and Processing

  • Survey of threat intelligence data collection methods.
  • Management strategies for threat intelligence collection.
  • Types of threat intelligence feeds and data sources.
  • Processes for acquiring threat intelligence data.
  • Techniques for bulk data collection.
  • Methods for processing and exploiting threat data.

Data Analysis

  • General overview of data analysis in this context.
  • Key techniques for data analysis.
  • Scope of threat analysis.
  • The threat analysis process in detail.
  • Refining and fine-tuning threat analysis capabilities.
  • Evaluating the quality of threat intelligence.
  • Development of runbooks and knowledge bases.
  • Survey of available threat intelligence tools.

Intelligence Reporting and Dissemination

  • Structure and content of threat intelligence reports.
  • Introduction to the dissemination of intelligence.
  • Engagement in sharing relationships.
  • Methods for sharing threat intelligence.
  • Different delivery mechanisms.
  • Platforms used for threat intelligence sharing.
  • Legal acts and regulations governing intelligence sharing.
  • Integration of threat intelligence into operational workflows.

Requirements

a:0:{}
 21 Hours

Testimonials (1)

Upcoming Courses

Related Categories