YoVDO

Introduction to the Threat Intelligence Lifecycle

Offered By: IBM via Coursera

Tags

Threat Intelligence Courses Cybersecurity Courses Information Analysis Courses

Course Description

Overview

Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn't? The Threat Intelligence lifecycle is the planning, collecting, processing, analyzing, and disseminating of information to help mitigate potential attacks and harmful events by treat actors. In this course, you will learn to: - Describe the different phases of the Threat Intelligence lifecycle - Explain the levels of information - Identify different intelligence data sources - Explain procedures and techniques used to process and analyze information - Discuss distributing intelligence to different audiences

Syllabus

  • Planning and Direction
    • The first step in the Threat Intelligence Lifecycle is Planning and Direction. In this module, you will learn how to identify the different types of intelligence and requirements.
  • Collection Plan
    • The next step in the Threat Intelligence Lifecycle is Collection. In this module, you will learn about the importance of having a comprehensive Collection Plan.
  • Data Sources
    • In the Collection phase, you will work with various data sources. In this module, you will learn about different data sources, collection disciplines, and the levels of information.
  • Processing
    • In this module, you will learn about the third phase of the Threat Intelligence Lifecycle, processing, and discuss how to process intelligence data.
  • Analysis and Production
    • In this module, you will learn about the fourth phase of the Threat Intelligence Lifecycle to analyze and produce intelligence.
  • Dissemination
    • The fifth phase of the Threat Intelligence Lifecycle is Dissemination. In this module, you will learn the different audiences who might consume intelligence and how to tailor the type of intelligence to that audience.

Taught by

IBM Security Learning Services

Tags

Related Courses

การรู้สารสนเทศ |Infomation Literacy
Nakhon Ratchasima Rajabhat University via ThaiMOOC
Capturing, Analyzing, and Using Lessons Learned (PMI - PMP)
Udemy
How to read & Evaluate Annual reports of Listed Companies
Udemy
Creación de Tablas de Base de Datos con SQL
Coursera Project Network via Coursera
Crear tablas de bases de datos relacionales con SQLiteStudio
Coursera Project Network via Coursera