Introduction to the Threat Intelligence Lifecycle
About this Course
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn\'t? The Threat Intelligence lifecycle is the planning, collecting, processing, analyzing, and disseminating of information to help mitigate potential attacks and harmful events by treat actors. In this course, you will learn to: - Describe the different phases of the Threat Intelligence lifecycle - Explain the levels of information - Identify different intelligence data sources - Explain procedures and techniques used to process and analyze information - Discuss distributing intelligence to different audiencesCreated by: IBM

Related Online Courses
This course will cover the topic of Whole genome sequencing (WGS) of bacterial genomes which is becoming more and more relevant for the medical sector. WGS technology and applications are high on... more
The Certified Ethical Emerging Technologist (CEET) industry validated certification helps professionals differentiate themselves from other job candidates by demonstrating their ability to... more
This specialization is intended for aspiring DevOps professionals and IT enthusiasts. Through 8 comprehensive courses, you will cover essential topics including DevOps prerequisites, Git, Jenkins,... more
In this specialization you will learn how to overcome the ravages of chronic stress and renew your body and mind by building better relationships and positive approaches to leadership. You will... more
The Version Control with Git course provides you with a solid, hands-on foundation for understanding the Git version control system. Git is open source software originally created by Linus... more