Get in Touch

Course Outline

Introduction to Cyber Threat Intelligence (CTI)

  • Definition and importance of CTI.
  • Types of Cyber Threat Intelligence: Tactical, Operational, Strategic, Technical.
  • Key concepts and terminologies.
  • Understanding different types of cyber threats (malware, phishing, ransomware, etc.).
  • Historical perspective on cyber threats and attacks.
  • Current trends in the cyber threat landscape.
  • Stages of the intelligence lifecycle.

Data Collection Methods

  • Sources of intelligence data (open source, dark web, internal sources).
  • Techniques for data collection.
  • Tools and technologies used in data collection.

Data Processing and Enrichment

  • Data processing techniques.
  • Data normalization and enrichment.
  • Automating data processing with tools.

Intelligence Analysis Techniques

  • Analytical methodologies: link analysis, trend analysis, behavioral analysis.
  • Tools for intelligence analysis.
  • Practical exercises on data analysis.

Introduction to Threat Intelligence Platforms (TIPs)

  • Overview of popular TIPs (e.g., MISP, ThreatConnect, Anomali).
  • Key features and functionalities of TIPs.
  • Integration of TIPs with other security tools.

Hands-On with Threat Intelligence Platforms

  • Practical session on setting up and using a TIP.
  • Data ingestion and correlation.
  • Customizing alerts and reports.

Automation in Threat Intelligence

  • Importance of automation in CTI.
  • Tools and techniques for automating threat intelligence processes.
  • Practical exercises on automation scripts.

Importance of Information Sharing

  • Benefits and challenges of sharing threat intelligence.
  • Models and frameworks for information sharing (e.g., STIX/TAXII, OpenC2).

Building an Information Sharing Community

  • Best practices for establishing a sharing community.
  • Legal and ethical considerations.
  • Case studies of successful information-sharing initiatives.

Collaborative Threat Intelligence Exercises

  • Conducting joint threat analysis.
  • Role-playing scenarios for intelligence sharing.
  • Developing strategies for effective collaboration.

Advanced Threat Intelligence Techniques

  • Use of machine learning and AI in CTI.
  • Advanced threat-hunting techniques.
  • Emerging trends in CTI.

Case Studies of Cyber Attacks

  • Detailed analysis of notable cyber attacks.
  • Lessons learned and intelligence insights.
  • Practical exercises on developing intelligence reports.

Developing a CTI Program

  • Steps to build and mature a CTI program.
  • Metrics and KPIs for measuring CTI effectiveness.

Summary and Next Steps

Requirements

  • Fundamental understanding of cybersecurity principles and practices.
  • Familiarity with network and information security concepts.
  • Experience working with IT systems and infrastructure.

Target Audience

  • Cybersecurity professionals.
  • IT security analysts.
  • Security Operations Center (SOC) personnel.
 35 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories