Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
The Cyber Threat Intelligence (CTI) course is taught by Cybrary SME, Dean Pompilio. It consists of 12 modules and provides a comprehensive introduction to CTI. The subject is an important one, and in addition to discussing tactics and methods, quite a bit of focus is placed on operational matters including the various CTI analyst roles.
Module 1 - Threat Intelligence Maturity Model
Module 2 - Campaigns and Open-Source Threat Intelligence
Module 3 - Sharing Operational Threat Intelligence
Module 4 - Strategic Threat Intelligence Analysis
The Advanced Cyber Threat Intelligence (CTI) course is taught by Cybrary SME, Dean Pompilio. It consists of 4 modules and dives deep into CTI. Learners are advised to begin with the Intro to Threat Intelligence Course prior to beginning this coursework. Cyber Threat intelligence is defined as "evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject's response to that menace or hazard." In the first module, Dean discusses the threat intelligence maturity model. Using this model, businesses are able to determine the level at which their current threat intelligence is operating, starting with those who are unclear where to begin up to those with a well-defined threat intelligence program. The model offers direction on risks and opportunities to grow at each phase. Following the threat intelligence maturity model, you'll dive into open-source threat intelligence, that is, data readily available on the web, which can point to a potential threat. You can use this information to learn from the attacks and patch before you fall victim, staying ahead of threats as they emerge. Module 3 covers sharing operational threat intelligence. Although this may seem counterintuitive, Dean shares how sharing intelligence across thousands of companies, associations, industries and governments can create a richer wealth of information that allows for all parties to benefit. In doing so, however, you be careful about the way in which this information is shared, as Dean explains. The course ends with a discussion on strategic threat intelligence analysis, forming an overall picture of the intent and capabilities of threats including the actors and tools. This information is critical for informing decision makers on long-term issues. Utilizing strategic threat intelligence is neccessary in developing a robust security strategy. Studying this topic is especially important for cyber professionals because it allows you to go beyond data collection about threats and helps you better understand how those threats can affect your organization. Among the benefits of Cyber Threat Intelligence are prevention of data loss, breach detection, incident response, threat analysis, data analysis, and intelligence sharing. A reference sheet for this course material can be found here Would you like to become a SOC analyst? This class is one step toward that goal, thanks to Cybrary's Career Path program.
Complete this course and earn a Advanced Cyber Threat Intelligence Certificate of Completion