Course Details
Course Outline
1 - Introduction to Threat Intelligence
Understanding IntelligenceUnderstanding Cyber Threat IntelligenceOverview of Threat Intelligence Lifecycle and Frameworks
2 - Cyber Threats and Kill Chain Methodology
Understanding Cyber ThreatsUnderstanding Advanced Persistent Threats (APTs)Understanding Cyber Kill ChainUnderstanding Indicators of Compromise (IoCs)
3 - Requirements, Planning, Direction, and Review
Understanding Organization’s Current Threat LandscapeUnderstanding Requirements AnalysisPlanning Threat Intelligence ProgramEstablishing Management SupportBuilding a Threat Intelligence TeamOverview of Threat Intelligence SharingReviewing Threat Intelligence Program
4 - Data Collection and Processing
Overview of Threat Intelligence Data CollectionOverview of Threat Intelligence Collection ManagementOverview of Threat Intelligence Feeds and SourcesUnderstanding Threat Intelligence Data Collection and AcquisitionUnderstanding Bulk Data CollectionUnderstanding Data Processing and Exploitation
5 - Data Analysis
Overview of Data AnalysisUnderstanding Data Analysis TechniquesOverview of Threat AnalysisUnderstanding Threat Analysis ProcessOverview of Fine-Tuning Threat AnalysisUnderstanding Threat Intelligence EvaluationCreating Runbooks and Knowledge BaseOverview of Threat Intelligence Tools
6 - Intelligence Reporting and Dissemination
Overview of Threat Intelligence ReportsIntroduction to DisseminationParticipating in Sharing RelationshipsOverview of Sharing Threat IntelligenceOverview of Delivery MechanismsUnderstanding Threat Intelligence Sharing PlatformsOverview of Intelligence Sharing Acts and RegulationsOverview of Threat Intelligence Integration
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
Target Audience
Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract the intelligence from data by implementing various advanced strategies. Such professional-level programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.
Ethical Hackers
Security Practitioners, Engineers, Analysts, Specialist, Architects, and Managers
Threat Intelligence Analysts, Associates, Researchers, Consultants
Threat Hunters
SOC Professionals
Digital Forensic and Malware Analysts
Incident Response Team Members
Any mid-level to high-level cybersecurity professionals with a minimum of 2 years of experience.
Individuals from the information security profession and who want to enrich their skills and knowledge in the field of cyber threat intelligence.
Individuals interested in preventing cyber threats.