Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Introduction to Threat Intelligence
- Grasping the concept of Intelligence.
- Understanding Cyber Threat Intelligence.
- Overview of the Threat Intelligence Lifecycle and Frameworks.
Cyber Threats and Kill Chain Methodology
- Understanding Cyber Threats.
- Comprehending Advanced Persistent Threats (APTs).
- Understanding the Cyber Kill Chain.
- Understanding Indicators of Compromise (IoCs).
Requirements, Planning, Direction, and Review
- Evaluating the Organization’s Current Threat Landscape.
- Understanding Requirements Analysis.
- Planning the Threat Intelligence Program.
- Securing Management Support.
- Building a Threat Intelligence Team.
- Overview of Threat Intelligence Sharing.
- Reviewing the Threat Intelligence Program.
Data Collection and Processing
- Overview of Threat Intelligence Data Collection.
- Overview of Threat Intelligence Collection Management.
- Overview of Threat Intelligence Feeds and Sources.
- Understanding Threat Intelligence Data Collection and Acquisition.
- Understanding Bulk Data Collection.
- Understanding Data Processing and Exploitation.
Data Analysis
- Overview of Data Analysis.
- Understanding Data Analysis Techniques.
- Overview of Threat Analysis.
- Understanding the Threat Analysis Process.
- Overview of Fine-Tuning Threat Analysis.
- Understanding Threat Intelligence Evaluation.
- Creating Runbooks and Knowledge Base.
- Overview of Threat Intelligence Tools.
Intelligence Reporting and Dissemination
- Overview of Threat Intelligence Reports.
- Introduction to Dissemination.
- Participating in Sharing Relationships.
- Overview of Sharing Threat Intelligence.
- Overview of Delivery Mechanisms.
- Understanding Threat Intelligence Sharing Platforms.
- Overview of Intelligence Sharing Acts and Regulations.
- Overview of Threat Intelligence Integration.
Requirements
a:0:{}
21 Hours
Testimonials (2)
The really lot of extra tools that was mentioned and the real life examples form Mane's experience.
Tamas Adam - Ericsson
Course - Certified Ethical Hacker CEH v.13 AI
Instructor delivery of information; At the end of the day it was Gaurav who pulled off this topic focusing on building strong fundamentals and devising a methodology to be retained with us