Introduction to the Threat Intelligence Lifecycle
About this Course
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn\'t? The Threat Intelligence lifecycle is the planning, collecting, processing, analyzing, and disseminating of information to help mitigate potential attacks and harmful events by treat actors. In this course, you will learn to: - Describe the different phases of the Threat Intelligence lifecycle - Explain the levels of information - Identify different intelligence data sources - Explain procedures and techniques used to process and analyze information - Discuss distributing intelligence to different audiencesCreated by: IBM
Related Online Courses
In this Software Product Management Specialization, you will master Agile software management practices to lead a team of developers and interact with clients. In the final Capstone Project, you... more
After this course you will be an Earth Economist that can provide evidence-based advise on the best global policy. As an Earth Economist you will better understand the behavior and advice of... more
This Specialization is designed for aspiring and active product leaders seeking to pursue careers in product management, product design, and related roles. Through five practical courses, you will... more
By the end of the specialization, you will be able to:\\n\\nApply creative thinking to a variety of workplace situations and challenges. Decide between various alternatives, determining which is... more
The goal of the Specialization is to showcase the ways in which the practice of mindfulness is an effective means of enhancing and maintaining optimal health and overall well-being that can be... more