CTI Operational Procedures with Jupyter Notebooks and MISP
Offered By: Cooper via YouTube
Course Description
Overview
Explore operational procedures for Cyber Threat Intelligence (CTI) using Jupyter Notebooks and MISP in this informative 21-minute video presentation. Gain insights into leveraging these powerful tools to enhance your threat intelligence capabilities, streamline analysis processes, and improve information sharing within your organization. Learn how to integrate Jupyter Notebooks with MISP (Malware Information Sharing Platform) to create efficient workflows, automate repetitive tasks, and visualize threat data effectively. Discover best practices for implementing CTI procedures and maximizing the potential of these open-source technologies in your cybersecurity operations.
Syllabus
CTI Operational Procedures With Jupyter Notebooks And MISP by Koen Van Impe
Taught by
Cooper
Related Courses
Cyber Threat IntelligenceIBM via Coursera Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning The Future of Network Security and Defence
Coventry University via FutureLearn Data Collection and Processing (CTIA Prep)
Pluralsight