Course curriculum

    1. Segment 00: Reading- Welcome to the Course: Course Overview

    2. Intro Video to Course

    3. M1L1V1 - What is Cyber Threat Intelligence

    4. M1L1V2 - Roles and Responsibilities of CTI

    5. M1L1V3 - CTI in Action

    1. M1L2V1-Tactical Threat Intelligence

    2. M1L2V2 - Operational Threat Intelligence

    3. M1L2V3-Strategic Threat Intelligence

    1. Reading - An introduction to threat intelligence

    2. Hands-On-Learning: - Simulated Intel: Navigating the Threat Intelligence Lifecycle

    3. M1L3V1-Direction_ Discovery_ and Collection

    4. M1L3V2-Processing and Analysis

    5. M1L3V3-Delivering Actionable Intelligence

    1. M2L1V1- Best Practices for Confidentiality

    2. M2L1V2 - Principles of Data and Information Integrity

    3. M2L1V3 - Continuous Access and Business Resilience_

    1. M2L2V1-Identifying Assets at Risk

    2. M2L2V2-Threat and Vulnerability Assessment

    3. M2L2V3 - Selecting and Actioning Control Strategies

    4. M2L2V3 - Selecting and Actioning Control Strategies

    1. Reading - Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events

    2. Hands-On-Learning: - From Threat to Insight: A CIA Triad Analysis Exercise

    3. M2L3V1-Direction_ Discovery_ and Collection

    4. M2L3V2 - Processing and Analysis

    5. M2L3V3-Sharing Intelligence to Improve and Adapt

About this course

  • Free
  • 46 lessons
  • 4 hours of video content

Discover your potential, starting today