CTI Operational Procedures with Jupyter Notebooks and MISP
Offered By: Cooper via YouTube
Course Description
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore operational procedures for Cyber Threat Intelligence (CTI) using Jupyter Notebooks and MISP in this informative 21-minute video presentation. Gain insights into leveraging these powerful tools to enhance your threat intelligence capabilities, streamline analysis processes, and improve information sharing within your organization. Learn how to integrate Jupyter Notebooks with MISP (Malware Information Sharing Platform) to create efficient workflows, automate repetitive tasks, and visualize threat data effectively. Discover best practices for implementing CTI procedures and maximizing the potential of these open-source technologies in your cybersecurity operations.
Syllabus
CTI Operational Procedures With Jupyter Notebooks And MISP by Koen Van Impe
Taught by
Cooper
Related Courses
Penetration Testing, Threat Hunting, and CryptographyIBM via Coursera Advanced Cyber Threat Intelligence
Cybrary Intro to Cyber Threat Intelligence
Cybrary MITRE ATT&CK Defenderā¢ (MAD) ATT&CKĀ® Cyber Threat Intelligence Certification Training
Cybrary Cyber Threat Intelligence
IBM via Coursera