Introduction
Introduction
()
1. What Is Threat Intelligence?
What is threat intelligence?
()
Use cases for threat intelligence
()
The value of threat intelligence for organizations
()
2. Threat Intelligence Sources and Languages
Types of intelligence
()
Threat intelligence sources and language
()
Closed-source intelligence
()
Human intelligence
()
Signals intelligence, also known as IOCs
()
Reliability of intelligence and the Admiralty System
()
The threat intel lingo
()
3. Threat Intelligence Analysis and Tools
Your most important tool: Brains (yours and other people's)
()
Analysis methods and threat frameworks
()
Google dorks
()
Open-source tools
()
Social media
()
4. Threat Actors and Tracking Actors
Criminal actors
()
Nation-state actors
()
Hacktivists
()
Cyberterrorists
()
Insider threat
()
Tracking threat actors
()
5. Getting Everything Together
Creating finished intelligence
()
Intelligence products
()
Working in a SOC
()
Working in a fusion center
()
6. Running Your Own Threat Intelligence Program
Threat intelligence life cycle
()
Planning and direction
()
Collection
()
Analysis
()
Production
()
Dissemination, feedback, and measuring success
()
Organizational maturity
()
Choosing and managing the right vendor
()
Vulnerability management
()
Tasking and managing analysts
()