Cyber Threat Intelligence

Learn about identifying and using available security knowledge to mitigate and manage potential adversary actions.
Cybersecurity today is about adversaries and defenders finding ways to outplay each other in a never-ending game of cat and mouse. Because of that, a lot of attack data is generated, which needs analysis to produce actionable information that defenders can act upon to thwart future attacks. That process is known as cyber threat intelligence. We'll explore threat intelligence concepts, including its lifecycle, various frameworks used, and a few open-source tools used to analyse malicious activities. We'll look closely at some notable platforms that share and manage collected intelligence in MISP and OpenCTI.

0%
Intro to Cyber Threat Intel
Introducing cyber threat intelligence and related topics, such as relevant standards and frameworks.
0%
Threat Intelligence Tools
Explore different OSINT tools used to conduct security threat assessments and investigations.
0%
Yara
Learn the applications and language that is Yara for everything threat intelligence, forensics, and threat hunting!
0%
OpenCTI
Provide an understanding of the OpenCTI Project
0%
MISP
Walkthrough on the use of MISP as a Threat Sharing Platform
0%
Friday Overtime
Step into the shoes of a Cyber Threat Intelligence Analyst and put your investigation skills to the test.
0%
Trooper
Use Cyber Threat Intelligence knowledge and skills to identify a threat based on a report.
Next steps
What are modules?
A learning pathway is made up of modules, and a module is made of bite-sized rooms (think of a room like a mini security lab).
