Connecting the Dots: How Threat Intelligence Protects Applications
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Discover how Cyber Threat Intelligence can revolutionize your Application Security Program in this informative 27-minute conference talk. Explore the concept of Cyber Threat Intelligence and learn effective implementation strategies to safeguard your business against cyber attacks. Gain insights into integrating threat intelligence into your AppSec world, including automated data collection and processing techniques. Understand how to leverage unstructured data from various sources to identify indicators of compromise (IoCs) and threat actors' tactics, techniques, and procedures (TTPs). Acquire valuable knowledge that will empower you to prevent and mitigate potential attacks, ultimately enhancing your organization's cybersecurity posture.
Syllabus
OWASP Standard Classification: Connecting the Dots: How Threat Intelligence Protect... - C. Curelaru
Taught by
OWASP Foundation
Related Courses
MongoDB for .NET DevelopersMongoDB University Web Application Development – Capstone Course
University of New Mexico via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Reliable Cloud Infrastructure: Design and Process auf Deutsch
Google Cloud via Coursera Securing and Integrating Components of your Application 日本語版
Google Cloud via Coursera