Introduction to the Threat Intelligence Lifecycle
About this Course
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn\'t? The Threat Intelligence lifecycle is the planning, collecting, processing, analyzing, and disseminating of information to help mitigate potential attacks and harmful events by treat actors. In this course, you will learn to: - Describe the different phases of the Threat Intelligence lifecycle - Explain the levels of information - Identify different intelligence data sources - Explain procedures and techniques used to process and analyze information - Discuss distributing intelligence to different audiencesCreated by: IBM

Related Online Courses
No matter how hard you try, there is no escaping the endless stream of advertising for all the nutritional supplements out there. From protein and creatine to caffeine and other more-controversial... more
This is a self-paced lab that takes place in the Google Cloud console. In this lab you will learn how to use Table Explorer and Data Insights with Gemini in BigQuery.Created by: Google Cloud more
This course is aimed at preparing individuals to gain knowledge, skills, and abilities to demonstrate the knowledge for managing Platform as a Service (PaaS) in the Cloud. Students will learn to... more
Designed to provide a holistic approach to business interactions, this curriculum combines essential skills in feedback delivery, teamwork, and writing to transform you into a proficient and... more
The courseware is designed to equip participants with a profound understanding of Payroll and HR Management. Tally is a revolutionary product which has been created with the objectives of Simplify... more