Cybersecurity today is about adversaries and defenders finding ways to outplay each other in a never-ending game of cat and mouse. Because of that, a lot of attack data is generated, which needs analysis to produce actionable information that defenders can act upon to thwart future attacks. That process is known as cyber threat intelligence. We'll explore threat intelligence concepts, including its lifecycle, various frameworks used, and a few open-source tools used to analyse malicious activities. We'll look closely at some notable platforms that share and manage collected intelligence in MISP and OpenCTI.
Loading rooms...
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).