Get in Touch

Course Outline

Introduction to Cyber Threat Intelligence (CTI)

  • Definition and significance of CTI.
  • Categories of Cyber Threat Intelligence: Tactical, Operational, Strategic, and Technical.
  • Core concepts and terminology.
  • Understanding various cyber threat types (e.g., malware, phishing, ransomware).
  • Historical context of cyber threats and attacks.
  • Current trends within the cyber threat landscape.
  • The stages of the intelligence lifecycle.

Data Collection Methods

  • Intelligence data sources (open source, dark web, internal resources).
  • Data collection techniques.
  • Tools and technologies employed in data collection.

Data Processing and Enrichment

  • Data processing methodologies.
  • Data normalization and enrichment.
  • Automating data processing using specific tools.

Intelligence Analysis Techniques

  • Analytical methodologies: link analysis, trend analysis, behavioral analysis.
  • Tools utilized for intelligence analysis.
  • Practical exercises focused on data analysis.

Introduction to Threat Intelligence Platforms (TIPs)

  • Overview of leading TIPs (e.g., MISP, ThreatConnect, Anomali).
  • Key features and functionalities of TIPs.
  • Integration of TIPs with other security tools.

Hands-On with Threat Intelligence Platforms

  • Practical session on configuring and utilizing a TIP.
  • Data ingestion and correlation.
  • Customizing alerts and reports.

Automation in Threat Intelligence

  • The importance of automation in CTI.
  • Tools and techniques for automating threat intelligence processes.
  • Practical exercises involving automation scripts.

The Importance of Information Sharing

  • Benefits and challenges associated with sharing threat intelligence.
  • Models and frameworks for information sharing (e.g., STIX/TAXII, OpenC2).

Building an Information Sharing Community

  • Best practices for establishing a sharing community.
  • Legal and ethical considerations.
  • Case studies of successful information-sharing initiatives.

Collaborative Threat Intelligence Exercises

  • Conducting joint threat analysis.
  • Role-playing scenarios for intelligence sharing.
  • Developing strategies for effective collaboration.

Advanced Threat Intelligence Techniques

  • Application of machine learning and AI in CTI.
  • Advanced threat-hunting techniques.
  • Emerging trends in CTI.

Case Studies of Cyber Attacks

  • Detailed analysis of notable cyber attacks.
  • Lessons learned and intelligence insights.
  • Practical exercises on developing intelligence reports.

Developing a CTI Program

  • Steps to build and mature a CTI program.
  • Metrics and KPIs for measuring CTI effectiveness.

Summary and Next Steps

Requirements

  • Foundational knowledge of cybersecurity principles and practices.
  • Familiarity with network and information security concepts.
  • Experience working with IT systems and infrastructure.

Target Audience

  • Cybersecurity professionals.
  • IT security analysts.
  • Staff members of Security Operations Centers (SOC).
 35 Hours

Custom Corporate Training

Training solutions designed exclusively for businesses.

  • Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
  • Flexible Schedule: Dates and times adapted to your team's agenda.
  • Format: Online (live), In-company (at your offices), or Hybrid.
Investment

Price per private group, online live training, starting from 6500 € + VAT*

Contact us for an exact quote and to hear our latest promotions

Testimonials (2)

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories