Advanced Cyber Threat Intelligence
Offered By: LinkedIn Learning
Course Description
Overview
Learn how to gather and make use of cyber threat intelligence in this advanced course.
Syllabus
Introduction
- Course introduction
- Introduction to the intelligence lifecycle
- Introduction to data collection
- Internal data acquisition
- External data sources
- Private data sources part 1
- Private data sources part 2
- Community data sources
- Public data sources part 1
- Public data sources part 2
- Leveraging OSINT part 1
- Leveraging OSINT part 2
- Introduction to data processing
- Common CTI standards part 1
- Common CTI standards part 2
- Storage and integration
- Threat intelligence platforms
- Introduction to analysis
- Analysis of competing hypothesis
- Cyber kill chain and diamond model
- Cyber kill chain and courses of action matrix
- Introduction to campaigns
- Heatmap analysis
- Visual analysis
- MITRE ATT&CK and the MITRE threat groups track
- Threat intelligence naming conventions
- Introduction to attribution
- Cognitive biases
- Logical fallacies
- How to manage biases
- Nation-state attribution part 1
- Nation-state attribution part 2
- Introduction to dissemination
- Tactical intelligence
- Operational intelligence
- Strategic intelligence
- Summary
Taught by
Cybrary
Related Courses
Cyber Threat IntelligenceIBM via Coursera Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning The Future of Network Security and Defence
Coventry University via FutureLearn Data Collection and Processing (CTIA Prep)
Pluralsight