YoVDO

Using Evernote as a Threat Intelligence Management Platform - Part 2

Offered By: YouTube

Tags

Conference Talks Courses Cybersecurity Courses Information Management Courses Evernote Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn how to leverage Evernote as a powerful threat intelligence management platform in this comprehensive conference talk. Explore the evolving threat intelligence market, understand key requirements, and discover the secret weapon for effective intelligence gathering. Delve into the fundamentals of threat intelligence, sharing methodologies, and case tracking techniques. Gain insights into utilizing open-source tools and OSN sources for enhanced threat detection. Master the art of automating processes, efficient sharing practices, and implementing effective tagging and note-taking strategies. Discover advanced search techniques and explore future developments in the field. Conclude with a summary of key takeaways and establish valuable connections for continued learning and collaboration in the realm of cybersecurity threat intelligence.

Syllabus

Introduction
Disclaimer
How I Started
Threat Intel Market
Requirements
The Secret Weapon
What is Threat Intelligence
Threat Intel Sharing
Case Tracking
Open Source Tools
OSN Sources
Automating
Sharing
Tagging
Notes
Search
Future Work
Summary
Contact


Related Courses

Introduction au game design
IONIS
Búsqueda y Gestión de la Información en la Web
Universidad de Santiago de Chile via Miríadax
Wirtschaftsinformatik
Technische Universität Berlin via iversity
Information & Digital Literacy for University Success
The University of Sydney via Coursera
Competitive Advantage: Using Information to Build Business Success
Deakin University via FutureLearn