Advanced Cyber Threat Intelligence
Offered By: LinkedIn Learning
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to gather and make use of cyber threat intelligence in this advanced course.
Syllabus
Introduction
- Course introduction
- Introduction to the intelligence lifecycle
- Introduction to data collection
- Internal data acquisition
- External data sources
- Private data sources part 1
- Private data sources part 2
- Community data sources
- Public data sources part 1
- Public data sources part 2
- Leveraging OSINT part 1
- Leveraging OSINT part 2
- Introduction to data processing
- Common CTI standards part 1
- Common CTI standards part 2
- Storage and integration
- Threat intelligence platforms
- Introduction to analysis
- Analysis of competing hypothesis
- Cyber kill chain and diamond model
- Cyber kill chain and courses of action matrix
- Introduction to campaigns
- Heatmap analysis
- Visual analysis
- MITRE ATT&CK and the MITRE threat groups track
- Threat intelligence naming conventions
- Introduction to attribution
- Cognitive biases
- Logical fallacies
- How to manage biases
- Nation-state attribution part 1
- Nation-state attribution part 2
- Introduction to dissemination
- Tactical intelligence
- Operational intelligence
- Strategic intelligence
- Summary
Taught by
Cybrary
Related Courses
Penetration Testing, Threat Hunting, and CryptographyIBM via Coursera Advanced Cyber Threat Intelligence
Cybrary Intro to Cyber Threat Intelligence
Cybrary MITRE ATT&CK Defenderā¢ (MAD) ATT&CKĀ® Cyber Threat Intelligence Certification Training
Cybrary Cyber Threat Intelligence
IBM via Coursera