Introduction to the Threat Intelligence Lifecycle
About this Course
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn\'t? The Threat Intelligence lifecycle is the planning, collecting, processing, analyzing, and disseminating of information to help mitigate potential attacks and harmful events by treat actors. In this course, you will learn to: - Describe the different phases of the Threat Intelligence lifecycle - Explain the levels of information - Identify different intelligence data sources - Explain procedures and techniques used to process and analyze information - Discuss distributing intelligence to different audiencesCreated by: IBM

Related Online Courses
Unlock the power of Snowflake and AWS to build robust, scalable data pipelines that integrate seamlessly with your data ecosystem. This course equips you with the tools to design, optimize, and... more
Welcome to the Architecting in AWS course! The \'Architecting in AWS\' course aligns with the AWS Certified Solutions Architect - Associate certification requirements. It assumes you have a basic... more
The Startup Entrepreneurship specialization focuses on issues of Innovation, Creativity and Entrepreneurship. It leads the students through the entire process of creating a start-up from an... more
This is a self-paced lab that takes place in the Google Cloud console. In this lab, you migrate MySQL data from an Amazon RDS instance for MySQL to Cloud SQL for MySQL using a one-time Database... more
The Network Automation Engineering Fundamentals Specialization takes mid- to expert-level network engineers through the primary topics of network automation and programmability and prepares them... more