Data Collection and Processing (CTIA Prep)
Offered By: Pluralsight
Course Description
Overview
This course will teach you the basics of threat data collection, processing and generating effective threat intelligence.
This course is intended for those that seek to enhance their understanding of cyber threat intelligence. In this course, Data Collection and Processing , you’ll learn the different types of data and data collection methods which may be employed in threat intelligence analysis. First, you’ll explore the different types of data and collection methods. Next, you’ll discover the importance of intelligence collection management. Finally, you’ll learn how to collect data from a variety of intelligence sources including OSINT and HUMINT. When you’re finished with this course, you’ll have the skills and knowledge of Threat Intelligence Data Collection and Processing needed to effectively collect, manage and process intelligence fed data.
This course is intended for those that seek to enhance their understanding of cyber threat intelligence. In this course, Data Collection and Processing , you’ll learn the different types of data and data collection methods which may be employed in threat intelligence analysis. First, you’ll explore the different types of data and collection methods. Next, you’ll discover the importance of intelligence collection management. Finally, you’ll learn how to collect data from a variety of intelligence sources including OSINT and HUMINT. When you’re finished with this course, you’ll have the skills and knowledge of Threat Intelligence Data Collection and Processing needed to effectively collect, manage and process intelligence fed data.
Syllabus
- Certification Prep Trailer 1min
- Discovering Threat Intelligence Collection 28mins
- Collecting Data from Open Sources 37mins
- Obtaining Open Source and Automating Data Collection 31mins
- Collecting Data Using HUMINT Sources 13mins
- Acquiring Data through CCI and IOCs 25mins
- Understanding Bulk Data Collection 10mins
- Domain Summary 7mins
Taught by
Phil Chapman
Related Courses
Cyber Threat IntelligenceIBM via Coursera Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight The Future of Network Security and Defence
Coventry University via FutureLearn OSINT - Open Source Intelligence Tutorials
YouTube