YoVDO

Connecting the Dots: How Threat Intelligence Protects Applications

Offered By: OWASP Foundation via YouTube

Tags

Cyber Threat Intelligence Courses Cybersecurity Courses Data Collection Courses Application Security Courses Risk Mitigation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover how Cyber Threat Intelligence can revolutionize your Application Security Program in this informative 27-minute conference talk. Explore the concept of Cyber Threat Intelligence and learn effective implementation strategies to safeguard your business against cyber attacks. Gain insights into integrating threat intelligence into your AppSec world, including automated data collection and processing techniques. Understand how to leverage unstructured data from various sources to identify indicators of compromise (IoCs) and threat actors' tactics, techniques, and procedures (TTPs). Acquire valuable knowledge that will empower you to prevent and mitigate potential attacks, ultimately enhancing your organization's cybersecurity posture.

Syllabus

OWASP Standard Classification: Connecting the Dots: How Threat Intelligence Protect... - C. Curelaru


Taught by

OWASP Foundation

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network