Course Outline
Introduction to Cyber Threat Intelligence (CTI)
- Definition and importance of CTI.
- Types of Cyber Threat Intelligence: Tactical, Operational, Strategic, Technical.
- Key concepts and terminologies.
- Understanding different types of cyber threats (malware, phishing, ransomware, etc.).
- Historical perspective on cyber threats and attacks.
- Current trends in the cyber threat landscape.
- Stages of the intelligence lifecycle.
Data Collection Methods
- Sources of intelligence data (open source, dark web, internal sources).
- Techniques for data collection.
- Tools and technologies used in data collection.
Data Processing and Enrichment
- Data processing techniques.
- Data normalization and enrichment.
- Automating data processing with tools.
Intelligence Analysis Techniques
- Analytical methodologies: link analysis, trend analysis, behavioral analysis.
- Tools for intelligence analysis.
- Practical exercises on data analysis.
Introduction to Threat Intelligence Platforms (TIPs)
- Overview of popular TIPs (e.g., MISP, ThreatConnect, Anomali).
- Key features and functionalities of TIPs.
- Integration of TIPs with other security tools.
Hands-On with Threat Intelligence Platforms
- Practical session on setting up and using a TIP.
- Data ingestion and correlation.
- Customizing alerts and reports.
Automation in Threat Intelligence
- Importance of automation in CTI.
- Tools and techniques for automating threat intelligence processes.
- Practical exercises on automation scripts.
Importance of Information Sharing
- Benefits and challenges of sharing threat intelligence.
- Models and frameworks for information sharing (e.g., STIX/TAXII, OpenC2).
Building an Information Sharing Community
- Best practices for establishing a sharing community.
- Legal and ethical considerations.
- Case studies of successful information-sharing initiatives.
Collaborative Threat Intelligence Exercises
- Conducting joint threat analysis.
- Role-playing scenarios for intelligence sharing.
- Developing strategies for effective collaboration.
Advanced Threat Intelligence Techniques
- Use of machine learning and AI in CTI.
- Advanced threat-hunting techniques.
- Emerging trends in CTI.
Case Studies of Cyber Attacks
- Detailed analysis of notable cyber attacks.
- Lessons learned and intelligence insights.
- Practical exercises on developing intelligence reports.
Developing a CTI Program
- Steps to build and mature a CTI program.
- Metrics and KPIs for measuring CTI effectiveness.
Summary and Next Steps
Requirements
- Fundamental understanding of cybersecurity principles and practices.
- Familiarity with network and information security concepts.
- Experience working with IT systems and infrastructure.
Target Audience
- Cybersecurity professionals.
- IT security analysts.
- Security Operations Center (SOC) personnel.
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.