Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to Threat Intelligence
- Core concepts of intelligence.
- Definition and scope of Cyber Threat Intelligence.
- Survey of the Threat Intelligence Lifecycle and associated frameworks.
Cyber Threats and the Kill Chain Methodology
- Analysis of modern cyber threats.
- Comprehension of Advanced Persistent Threats (APTs).
- Deep dive into the Cyber Kill Chain model.
- Identification and interpretation of Indicators of Compromise (IoCs).
Requirements, Planning, Direction, and Review
- Assessment of the organization’s current threat landscape.
- Evaluation of specific requirements analysis.
- Strategic planning for the Threat Intelligence Program.
- Securing executive management support.
- Establishing a dedicated Threat Intelligence team.
- Introduction to collaborative threat intelligence sharing.
- Periodic review of the Threat Intelligence Program.
Data Collection and Processing
- Survey of threat intelligence data collection methods.
- Management strategies for threat intelligence collection.
- Types of threat intelligence feeds and data sources.
- Processes for acquiring threat intelligence data.
- Techniques for bulk data collection.
- Methods for processing and exploiting threat data.
Data Analysis
- General overview of data analysis in this context.
- Key techniques for data analysis.
- Scope of threat analysis.
- The threat analysis process in detail.
- Refining and fine-tuning threat analysis capabilities.
- Evaluating the quality of threat intelligence.
- Development of runbooks and knowledge bases.
- Survey of available threat intelligence tools.
Intelligence Reporting and Dissemination
- Structure and content of threat intelligence reports.
- Introduction to the dissemination of intelligence.
- Engagement in sharing relationships.
- Methods for sharing threat intelligence.
- Different delivery mechanisms.
- Platforms used for threat intelligence sharing.
- Legal acts and regulations governing intelligence sharing.
- Integration of threat intelligence into operational workflows.
Requirements
a:0:{}
21 Hours
Testimonials (1)
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us