Advanced Cyber Threat Intelligence
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to gather and make use of cyber threat intelligence in this advanced course.
Syllabus
Introduction
- Course introduction
- Introduction to the intelligence lifecycle
- Introduction to data collection
- Internal data acquisition
- External data sources
- Private data sources part 1
- Private data sources part 2
- Community data sources
- Public data sources part 1
- Public data sources part 2
- Leveraging OSINT part 1
- Leveraging OSINT part 2
- Introduction to data processing
- Common CTI standards part 1
- Common CTI standards part 2
- Storage and integration
- Threat intelligence platforms
- Introduction to analysis
- Analysis of competing hypothesis
- Cyber kill chain and diamond model
- Cyber kill chain and courses of action matrix
- Introduction to campaigns
- Heatmap analysis
- Visual analysis
- MITRE ATT&CK and the MITRE threat groups track
- Threat intelligence naming conventions
- Introduction to attribution
- Cognitive biases
- Logical fallacies
- How to manage biases
- Nation-state attribution part 1
- Nation-state attribution part 2
- Introduction to dissemination
- Tactical intelligence
- Operational intelligence
- Strategic intelligence
- Summary
Taught by
Cybrary
Related Courses
Cybersecurity FoundationsLinkedIn Learning Ethical Hacking with JavaScript
LinkedIn Learning Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning Cyber Security, Tools, Techniques and Counter Measures
IGNOU via Swayam Expert Malware Analysis and Reverse Engineering
Udemy