YoVDO

CTI Operational Procedures with Jupyter Notebooks and MISP

Offered By: Cooper via YouTube

Tags

Cyber Threat Intelligence Courses Data Visualization Courses Jupyter Notebooks Courses MISP Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore operational procedures for Cyber Threat Intelligence (CTI) using Jupyter Notebooks and MISP in this informative 21-minute video presentation. Gain insights into leveraging these powerful tools to enhance your threat intelligence capabilities, streamline analysis processes, and improve information sharing within your organization. Learn how to integrate Jupyter Notebooks with MISP (Malware Information Sharing Platform) to create efficient workflows, automate repetitive tasks, and visualize threat data effectively. Discover best practices for implementing CTI procedures and maximizing the potential of these open-source technologies in your cybersecurity operations.

Syllabus

CTI Operational Procedures With Jupyter Notebooks And MISP by Koen Van Impe


Taught by

Cooper

Related Courses

Penetration Testing, Threat Hunting, and Cryptography
IBM via Coursera
Advanced Cyber Threat Intelligence
Cybrary
Intro to Cyber Threat Intelligence
Cybrary
MITRE ATT&CK Defenderā„¢ (MAD) ATT&CKĀ® Cyber Threat Intelligence Certification Training
Cybrary
Cyber Threat Intelligence
IBM via Coursera