Course Outline

Introduction to Cyber Threat Intelligence (CTI)

  • Definition and importance of CTI
  • Types of Cyber Threat Intelligence: Tactical, Operational, Strategic, Technical
  • Key concepts and terminologies
  • Understanding different types of cyber threats (malware, phishing, ransomware, etc.)
  • Historical perspective on cyber threats and attacks
  • Current trends in the cyber threat landscape
  • Stages of the intelligence lifecycle

Data Collection Methods

  • Sources of intelligence data (open source, dark web, internal sources)
  • Techniques for data collection
  • Tools and technologies used in data collection

Data Processing and Enrichment

  • Data processing techniques
  • Data normalization and enrichment
  • Automating data processing with tools

Intelligence Analysis Techniques

  • Analytical methodologies: link analysis, trend analysis, behavioral analysis
  • Tools for intelligence analysis
  • Practical exercises on data analysis

Introduction to Threat Intelligence Platforms (TIPs)

  • Overview of popular TIPs (e.g., MISP, ThreatConnect, Anomali)
  • Key features and functionalities of TIPs
  • Integration of TIPs with other security tools

Hands-On with Threat Intelligence Platforms

  • Practical session on setting up and using a TIP
  • Data ingestion and correlation
  • Customizing alerts and reports

Automation in Threat Intelligence

  • Importance of automation in CTI
  • Tools and techniques for automating threat intelligence processes
  • Practical exercises on automation scripts

Importance of Information Sharing

  • Benefits and challenges of sharing threat intelligence
  • Models and frameworks for information sharing (e.g., STIX/TAXII, OpenC2)

Building an Information Sharing Community

  • Best practices for establishing a sharing community
  • Legal and ethical considerations
  • Case studies of successful information-sharing initiatives

Collaborative Threat Intelligence Exercises

  • Conducting joint threat analysis
  • Role-playing scenarios for intelligence sharing
  • Developing strategies for effective collaboration

Advanced Threat Intelligence Techniques

  • Use of machine learning and AI in CTI
  • Advanced threat-hunting techniques
  • Emerging trends in CTI

Case Studies of Cyber Attacks

  • Detailed analysis of notable cyber attacks
  • Lessons learned and intelligence insights
  • Practical exercises on developing intelligence reports

Developing a CTI Program

  • Steps to build and mature a CTI program
  • Metrics and KPIs for measuring CTI effectiveness

Summary and Next Steps

Requirements

  • Basic understanding of cybersecurity principles and practices
  • Familiarity with network and information security concepts
  • Experience with IT systems and infrastructure

Audience

  • Cybersecurity professionals
  • IT security analysts
  • Security operations center (SOC) staff
 35 Hours

Delivery Options

Private Group Training

Our identity is rooted in delivering exactly what our clients need.

  • Pre-course call with your trainer
  • Customisation of the learning experience to achieve your goals -
    • Bespoke outlines
    • Practical hands-on exercises containing data / scenarios recognisable to the learners
  • Training scheduled on a date of your choice
  • Delivered online, onsite/classroom or hybrid by experts sharing real world experience

Private Group Prices RRP from €11400 online delivery, based on a group of 2 delegates, €3600 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.

Contact us for an exact quote and to hear our latest promotions


Public Training

Please see our public courses

Testimonials (3)

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories