Cyber Threat Intelligence Demystified - Leveraging Intelligence for Effective Cybersecurity
Offered By: Okta via YouTube
Course Description
Overview
Syllabus
Intro
ADVERSARIES ARE BECOMING MORE CAPABLE WHILE... DEFENDERS ARE STRUGGLING TO STOP THEM
THREAT INTELLIGENCE IS ABOUT UNDERSTANDING THE RELATIONSHIP BETWEEN OURSELVES & THE ADVERSARY
THE OUTCOME OF VIRTUALLY ALL CONFUCTS IS DITERMINED AS A FUNCTION OF THREE CORE COMPONENTS
BEST PRACTICES: TACTICAL INTELLIGENCE
TACTICAL INTELLIGENCE HIGHLIGHT
BEST PRACTICES OPERATIONAL INTELLIGENCE
BEST PRACTICES: STRATEGIC INTELLIGENCE
THREAT INTELLIGENCE WHAT USE CASES ARE RELEVANT TO YOU?
INVESTIGATIONS WITHOUT AUTOMATION ARE BOTH TIME CONSUMING AND COMPLICATED
FALCON X ENDPOINT INTELLIGENCE AUTOMATION WORKFLOW
FALCON X IS THE FIRST AND ONLY INTEL CAPABILITY TO AUTOMATICALLY SYNTHESIZE ENDPOINT DETECTIONS WITH THREAT INTELLIGENCE
FALCON X THREAT INTELLIGENCE PRODUCT
FALCON X STANDARD
FALCON X PREMIUM
FALCON X ELITE
FALCON X DEDICATED ANALYST PROGRAM
FALCON X CAPABILITIES
LOOKING FOR MORE INFORMATION?
Taught by
Okta
Related Courses
Cyber Threat IntelligenceIBM via Coursera Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning The Future of Network Security and Defence
Coventry University via FutureLearn Data Collection and Processing (CTIA Prep)
Pluralsight