Threat Analysis Tools
Understand how to leverage threat intelligence to detect, investigate and defend against adversaries. Gain practical skills in using threat data, enrichment techniques, and analysis workflows to strengthen SOC capabilities.
This module explores the foundations of threat intelligence, covering data sources, enrichment and analytical methods. You will work with files, hashes, IPs, domains, and intelligence feeds to identify threats, track adversary behaviour, and connect findings to MITRE ATT&CK techniques. By the end, you will know how to operationalise threat intelligence in investigations and reporting.
0%
Intro to Cyber Threat Intel
Introducing cyber threat intelligence and related topics, such as relevant standards and frameworks.
0%
File and Hash Threat Intel
This room seeks to teach on enriching file and hash artefacts using threat intelligence.
0%
IP and Domain Threat Intel
A look into enriching IP and domain insights with open source threat intelligence.
0%
Invite Only
Extract insight from a set of flagged artefacts, and distil the information into usable threat intelligence.
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).

