by Dean Pompilio

Advanced Cyber Threat Intelligence

0% Completed

3 hours
3 hours
Share this course and earn Cybytes
Course Material
Course Description

The Advanced Cyber Threat Intelligence (CTI) course is taught by Cybrary SME, Dean Pompilio. It consists of 4 modules and dives deep into CTI. Learners are advised to begin with the Intro to Threat Intelligence Course prior to beginning this coursework.

Cyber Threat intelligence is defined as  “evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard.”

In the first module, Dean discusses the threat intelligence maturity model. Using this model, businesses are able to determine the level at which their current threat intelligence is operating, starting with those who are unclear where to begin up to those with a well-defined threat intelligence program. The model offers direction on risks and opportunities to grow at each phase.

Following the threat intelligence maturity model, you’ll dive into open-source threat intelligence, that is, data readily available on the web, which can point to a potential threat. You can use this information to learn from the attacks and patch before you fall victim, staying ahead of threats as they emerge.

Module 3 covers sharing operational threat intelligence. Although this may seem counterintuitive, Dean shares how sharing intelligence across thousands of companies, associations, industries and governments can create a richer wealth of information that allows for all parties to benefit. In doing so, however, you be careful about the way in which this information is shared, as Dean explains.

The course ends with a discussion on strategic threat intelligence analysis, forming an overall picture of the intent and capabilities of threats including the actors and tools. This information is critical for informing decision makers on long-term issues. Utilizing strategic threat intelligence is neccessary in developing a robust security strategy.

Studying this topic is especially important for cyber professionals because it allows you to go beyond data collection about threats and helps you better understand how those threats can affect your organization. Among the benefits of Cyber Threat Intelligence are prevention of data loss, breach detection, incident response, threat analysis, data analysis, and intelligence sharing.

Course Badge
What is a Course Badge? Whenever you feel that you have mastered the content of a course, get yourself a nifty course badge to show off your profile.
Current Cybyte Count:
Course Badge: 15 Cybytes
Buy Badge
You need more Cybytes to earn this Course Badge
$ = 25 Cybytes

How do I earn my Certificate of Completion?

1. Complete Advanced Cyber Threat Intelligence on Cybrary

2. Earn Cybytes by logging in, completing lessons and sharing courses and other content

3. Use your Cybytes to earn your Cybrary verified Certificate of Completion

Have questions? Visit our FAQ page to learn more.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play

Support Cybrary

Donate Here to Get This Month's Donor Badge

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?