Course Outline
Introduction to Cyber Threat Intelligence (CTI)
- Definition and importance of CTI
- Types of Cyber Threat Intelligence: Tactical, Operational, Strategic, Technical
- Key concepts and terminologies
- Understanding different types of cyber threats (malware, phishing, ransomware, etc.)
- Historical perspective on cyber threats and attacks
- Current trends in the cyber threat landscape
- Stages of the intelligence lifecycle
Data Collection Methods
- Sources of intelligence data (open source, dark web, internal sources)
- Techniques for data collection
- Tools and technologies used in data collection
Data Processing and Enrichment
- Data processing techniques
- Data normalization and enrichment
- Automating data processing with tools
Intelligence Analysis Techniques
- Analytical methodologies: link analysis, trend analysis, behavioral analysis
- Tools for intelligence analysis
- Practical exercises on data analysis
Introduction to Threat Intelligence Platforms (TIPs)
- Overview of popular TIPs (e.g., MISP, ThreatConnect, Anomali)
- Key features and functionalities of TIPs
- Integration of TIPs with other security tools
Hands-On with Threat Intelligence Platforms
- Practical session on setting up and using a TIP
- Data ingestion and correlation
- Customizing alerts and reports
Automation in Threat Intelligence
- Importance of automation in CTI
- Tools and techniques for automating threat intelligence processes
- Practical exercises on automation scripts
Importance of Information Sharing
- Benefits and challenges of sharing threat intelligence
- Models and frameworks for information sharing (e.g., STIX/TAXII, OpenC2)
Building an Information Sharing Community
- Best practices for establishing a sharing community
- Legal and ethical considerations
- Case studies of successful information-sharing initiatives
Collaborative Threat Intelligence Exercises
- Conducting joint threat analysis
- Role-playing scenarios for intelligence sharing
- Developing strategies for effective collaboration
Advanced Threat Intelligence Techniques
- Use of machine learning and AI in CTI
- Advanced threat-hunting techniques
- Emerging trends in CTI
Case Studies of Cyber Attacks
- Detailed analysis of notable cyber attacks
- Lessons learned and intelligence insights
- Practical exercises on developing intelligence reports
Developing a CTI Program
- Steps to build and mature a CTI program
- Metrics and KPIs for measuring CTI effectiveness
Summary and Next Steps
Requirements
- Basic understanding of cybersecurity principles and practices
- Familiarity with network and information security concepts
- Experience with IT systems and infrastructure
Audience
- Cybersecurity professionals
- IT security analysts
- Security operations center (SOC) staff
Testimonials (4)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
All is excellent