Introduction to the Threat Intelligence Lifecycle
About this Course
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn\'t? The Threat Intelligence lifecycle is the planning, collecting, processing, analyzing, and disseminating of information to help mitigate potential attacks and harmful events by treat actors. In this course, you will learn to: - Describe the different phases of the Threat Intelligence lifecycle - Explain the levels of information - Identify different intelligence data sources - Explain procedures and techniques used to process and analyze information - Discuss distributing intelligence to different audiencesCreated by: IBM

Related Online Courses
Much of the world\'s data lives in databases. SQL (or Structured Query Language) is a powerful programming language that is used for communicating with and manipulating data in databases. A working... more
In this course, learners begin with a macro-level view of the current state of the world and touch upon topics such as climate change, plastic pollution, social inequity, and the economic systems... more
This course introduces students to the basic components of electronics: diodes, transistors, and op amps. It covers the basic operation and some common applications.Created by: Georgia Institute of... more
In an era where Artificial Intelligence (AI) is rapidly transforming high-risk domains like healthcare, finance, and criminal justice, the ability to develop AI systems that are not only accurate... more
This course, Additive Manufacturing, is the third course in the Coursera Specialization, Digital Technologies and the Future of Manufacturing. In this course, learners will be introduced to the... more