YoVDO

CTI Operational Procedures with Jupyter Notebooks and MISP

Offered By: Cooper via YouTube

Tags

Cyber Threat Intelligence Courses Data Visualization Courses Jupyter Notebooks Courses MISP Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore operational procedures for Cyber Threat Intelligence (CTI) using Jupyter Notebooks and MISP in this informative 21-minute video presentation. Gain insights into leveraging these powerful tools to enhance your threat intelligence capabilities, streamline analysis processes, and improve information sharing within your organization. Learn how to integrate Jupyter Notebooks with MISP (Malware Information Sharing Platform) to create efficient workflows, automate repetitive tasks, and visualize threat data effectively. Discover best practices for implementing CTI procedures and maximizing the potential of these open-source technologies in your cybersecurity operations.

Syllabus

CTI Operational Procedures With Jupyter Notebooks And MISP by Koen Van Impe


Taught by

Cooper

Related Courses

Cyber Threat Intelligence
IBM via Coursera
Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight
Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning
The Future of Network Security and Defence
Coventry University via FutureLearn
Data Collection and Processing (CTIA Prep)
Pluralsight