Introduction
Defending your network
()
1. The Not-So-Basics of Threat Intelligence
What threat intelligence really is
()
Learning the key terms
()
Cyber threat intelligence frameworks
()
Threat actors and their motivations
()
2. How Different Departments Use Intelligence
How the SOC uses intelligence
()
How incident response uses intelligence
()
How the leadership team uses intelligence
()
How the risk team uses intelligence
()
3. The Intelligence Process
Planning for threat intelligence implementation
()
Collecting threat intelligence: Part 1
()
Collecting threat intelligence: Part 2
()
Processing threat intelligence
()
Analyzing threat intelligence
()
Dissemination and feedback
()
4. Implementing Threat Intelligence
How to start a threat intelligence program
()
How to scale a threat intelligence program
()
Metrics to consider
()
Conclusion
Stay up to date on CTI
()
Ex_Files_Learning_Threat_Intelligence.zip
(352 KB)