Introduction to the Threat Intelligence Lifecycle
About this Course
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn\'t? The Threat Intelligence lifecycle is the planning, collecting, processing, analyzing, and disseminating of information to help mitigate potential attacks and harmful events by treat actors. In this course, you will learn to: - Describe the different phases of the Threat Intelligence lifecycle - Explain the levels of information - Identify different intelligence data sources - Explain procedures and techniques used to process and analyze information - Discuss distributing intelligence to different audiencesCreated by: IBM
Related Online Courses
Although modern React tends to use functional components, knowledge of class components remains a useful skill to have in your toolbox. You might find yourself dealing with legacy code, or a... more
This is a self-paced lab that takes place in the Google Cloud console. Create a Google Cloud SQL MySQL instance and perform SQL operations using Google Cloud Platform Console and mysql client.... more
This specialized Program is aimed at leaders and entrepreneurs, who seek to develop strategies for transgenerational entrepreneurship and innovation.\\n\\nThrough three courses, you will cover the... more
In the third course, you will learn how to use information from cost accounting to improve managerial decision-making. We discuss business decisions and suggest how cost information can support... more
This course introduces real-time cyber security techniques and methods in the context of the TCP/IP protocol suites. Explanation of some basic TCP/IP security hacks is used to introduce the need... more