YoVDO

Connecting the Dots: How Threat Intelligence Protects Applications

Offered By: OWASP Foundation via YouTube

Tags

Cyber Threat Intelligence Courses Cybersecurity Courses Data Collection Courses Application Security Courses Risk Mitigation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how Cyber Threat Intelligence can revolutionize your Application Security Program in this informative 27-minute conference talk. Explore the concept of Cyber Threat Intelligence and learn effective implementation strategies to safeguard your business against cyber attacks. Gain insights into integrating threat intelligence into your AppSec world, including automated data collection and processing techniques. Understand how to leverage unstructured data from various sources to identify indicators of compromise (IoCs) and threat actors' tactics, techniques, and procedures (TTPs). Acquire valuable knowledge that will empower you to prevent and mitigate potential attacks, ultimately enhancing your organization's cybersecurity posture.

Syllabus

OWASP Standard Classification: Connecting the Dots: How Threat Intelligence Protect... - C. Curelaru


Taught by

OWASP Foundation

Related Courses

MongoDB for .NET Developers
MongoDB University
Web Application Development – Capstone Course
University of New Mexico via Coursera
Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent
Reliable Cloud Infrastructure: Design and Process auf Deutsch
Google Cloud via Coursera
Securing and Integrating Components of your Application 日本語版
Google Cloud via Coursera