Cyber Threat Intelligence Demystified - Leveraging Intelligence for Effective Cybersecurity
Offered By: Okta via YouTube
Course Description
Overview
Syllabus
Intro
ADVERSARIES ARE BECOMING MORE CAPABLE WHILE... DEFENDERS ARE STRUGGLING TO STOP THEM
THREAT INTELLIGENCE IS ABOUT UNDERSTANDING THE RELATIONSHIP BETWEEN OURSELVES & THE ADVERSARY
THE OUTCOME OF VIRTUALLY ALL CONFUCTS IS DITERMINED AS A FUNCTION OF THREE CORE COMPONENTS
BEST PRACTICES: TACTICAL INTELLIGENCE
TACTICAL INTELLIGENCE HIGHLIGHT
BEST PRACTICES OPERATIONAL INTELLIGENCE
BEST PRACTICES: STRATEGIC INTELLIGENCE
THREAT INTELLIGENCE WHAT USE CASES ARE RELEVANT TO YOU?
INVESTIGATIONS WITHOUT AUTOMATION ARE BOTH TIME CONSUMING AND COMPLICATED
FALCON X ENDPOINT INTELLIGENCE AUTOMATION WORKFLOW
FALCON X IS THE FIRST AND ONLY INTEL CAPABILITY TO AUTOMATICALLY SYNTHESIZE ENDPOINT DETECTIONS WITH THREAT INTELLIGENCE
FALCON X THREAT INTELLIGENCE PRODUCT
FALCON X STANDARD
FALCON X PREMIUM
FALCON X ELITE
FALCON X DEDICATED ANALYST PROGRAM
FALCON X CAPABILITIES
LOOKING FOR MORE INFORMATION?
Taught by
Okta
Related Courses
Palo Alto Networks CybersecurityPalo Alto Networks via Coursera (ISC)² Systems Security Certified Practitioner (SSCP)
(ISC)² via Coursera CompTIA Security+ (SY0-701) Complete Course & Exam
Udemy SSCP®: Monitoring and Analysis & Risk, Response, and Recovery (2012 Objectives)
Pluralsight SSCP®: Security Operations and Administration
Pluralsight