Cyber Threat Intelligence Demystified - Leveraging Intelligence for Effective Cybersecurity
Offered By: Okta via YouTube
Course Description
Overview
Syllabus
Intro
ADVERSARIES ARE BECOMING MORE CAPABLE WHILE... DEFENDERS ARE STRUGGLING TO STOP THEM
THREAT INTELLIGENCE IS ABOUT UNDERSTANDING THE RELATIONSHIP BETWEEN OURSELVES & THE ADVERSARY
THE OUTCOME OF VIRTUALLY ALL CONFUCTS IS DITERMINED AS A FUNCTION OF THREE CORE COMPONENTS
BEST PRACTICES: TACTICAL INTELLIGENCE
TACTICAL INTELLIGENCE HIGHLIGHT
BEST PRACTICES OPERATIONAL INTELLIGENCE
BEST PRACTICES: STRATEGIC INTELLIGENCE
THREAT INTELLIGENCE WHAT USE CASES ARE RELEVANT TO YOU?
INVESTIGATIONS WITHOUT AUTOMATION ARE BOTH TIME CONSUMING AND COMPLICATED
FALCON X ENDPOINT INTELLIGENCE AUTOMATION WORKFLOW
FALCON X IS THE FIRST AND ONLY INTEL CAPABILITY TO AUTOMATICALLY SYNTHESIZE ENDPOINT DETECTIONS WITH THREAT INTELLIGENCE
FALCON X THREAT INTELLIGENCE PRODUCT
FALCON X STANDARD
FALCON X PREMIUM
FALCON X ELITE
FALCON X DEDICATED ANALYST PROGRAM
FALCON X CAPABILITIES
LOOKING FOR MORE INFORMATION?
Taught by
Okta
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network