Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Identifying and interpreting threat intelligence is crucial to preventing and mitigating cyber attacks. In this course, you'll explore the various threat intelligence types and how they relate to an organization's threat landscape.

You'll begin by examining the key characteristics and benefits of threat intelligence and how to use it before, during, and after an attack. You'll then name known cyber threat actors and common indicators of compromise. You'll characterize intelligence, data, and information, and the four categories of threat intelligence: strategic, tactical, operational, and technical.

You'll outline the threat intelligence lifecycle and how machine learning and risk modeling relate to threat intelligence. Lastly, you'll recognize threat intelligence use cases and sources, and how to map the threat landscape and benefit from intrusion detection and analysis.



Expected Duration (hours)
1.7

Lesson Objectives

Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts

  • discover the key concepts covered in this course
  • recognize the purpose and benefits of threat intelligence and outline its various definitions
  • list the core characteristics of threat intelligence
  • name the parties who can benefit from threat intelligence
  • describe when and how to use threat intelligence including before, during, and after an attack
  • categorize and identify the different cyber threat actors
  • list common indicators of compromise
  • differentiate among intelligence, data, and information
  • outline the 6 phases of the threat intelligence lifecycle
  • describe what is meant by strategic threat intelligence and list some common sources of information for it
  • define what is meant by tactical threat intelligence and recognize key components and benefits of it
  • define what is meant by operational threat intelligence and outline some associated challenges and solutions
  • define what is meant by technical threat intelligence and describe its purpose
  • describe how machine learning can improve threat intelligence
  • define what is involved in risk analysis and risk modeling as they relate to threat intelligence and outline the FAIR risk model and framework
  • list the various use cases for threat intelligence
  • describe how threat intelligence can help map the threat landscape
  • recognize why intrusion detection is the heart of threat intelligence and outline the kill chain and diamond models of analysis
  • differentiate between different threat intelligent sources, such as credentials, mobile apps, social media
  • summarize the key concepts covered in this course
  • Course Number:
    it_cytibpdj_01_enus

    Expertise Level
    Intermediate