Connecting the Dots: How Threat Intelligence Protects Applications
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Discover how Cyber Threat Intelligence can revolutionize your Application Security Program in this informative 27-minute conference talk. Explore the concept of Cyber Threat Intelligence and learn effective implementation strategies to safeguard your business against cyber attacks. Gain insights into integrating threat intelligence into your AppSec world, including automated data collection and processing techniques. Understand how to leverage unstructured data from various sources to identify indicators of compromise (IoCs) and threat actors' tactics, techniques, and procedures (TTPs). Acquire valuable knowledge that will empower you to prevent and mitigate potential attacks, ultimately enhancing your organization's cybersecurity posture.
Syllabus
OWASP Standard Classification: Connecting the Dots: How Threat Intelligence Protect... - C. Curelaru
Taught by
OWASP Foundation
Related Courses
Cyber Threat IntelligenceIBM via Coursera Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning The Future of Network Security and Defence
Coventry University via FutureLearn Data Collection and Processing (CTIA Prep)
Pluralsight