The Threat Intelligence course
will provide students with an in-depth examination of the cyber threat intelligence
cycle, the incident response cycle, and how they combine to form the
Intelligence-driven Incident Response (IDIR) process. Students will use
interactive exercises to become familiar with and practice the creation and consumption
of Cyber Threat Intelligence products.
Course Outlines:
·
Introduction: Threat Intelligence
·
Cybercrime Tactics, Techniques, and Procedures (TTP)
·
Financial actor motivations
·
Hacktivism
·
Computer Network Exploitation (CNE) I
·
Computer Network Exploitation (CNE) II
·
Insiders
·
The “security” in “cyber security”
·
Critical Infrastructure and Key Resources (CIKR)
·
Disruptive and emerging technologies I
·
Disruptive and emerging technologies II
·
Biases, mindsets, assumptions, and uncertainty
·
Cyber Ethics
·
Capstone exercise
·
Individual Case and Final Discussions
Share course with your friends
Cookies and similar technologies are used on our sites to personalize content and ads. You can find further details and change your personal settings below. By clicking OK, or by clicking any content on our sites, you agree to the use of these cookies and similar technologies.
When you visit any of our websites, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and manage your preferences. Please note, that blocking some types of cookies may impact your experience of the site and the services we are able to offer.