Course Outline
Introduction to Cyber Threat Intelligence (CTI)
- Definition and significance of CTI.
- Categories of Cyber Threat Intelligence: Tactical, Operational, Strategic, and Technical.
- Core concepts and terminology.
- Understanding various cyber threat types (e.g., malware, phishing, ransomware).
- Historical context of cyber threats and attacks.
- Current trends within the cyber threat landscape.
- The stages of the intelligence lifecycle.
Data Collection Methods
- Intelligence data sources (open source, dark web, internal resources).
- Data collection techniques.
- Tools and technologies employed in data collection.
Data Processing and Enrichment
- Data processing methodologies.
- Data normalization and enrichment.
- Automating data processing using specific tools.
Intelligence Analysis Techniques
- Analytical methodologies: link analysis, trend analysis, behavioral analysis.
- Tools utilized for intelligence analysis.
- Practical exercises focused on data analysis.
Introduction to Threat Intelligence Platforms (TIPs)
- Overview of leading TIPs (e.g., MISP, ThreatConnect, Anomali).
- Key features and functionalities of TIPs.
- Integration of TIPs with other security tools.
Hands-On with Threat Intelligence Platforms
- Practical session on configuring and utilizing a TIP.
- Data ingestion and correlation.
- Customizing alerts and reports.
Automation in Threat Intelligence
- The importance of automation in CTI.
- Tools and techniques for automating threat intelligence processes.
- Practical exercises involving automation scripts.
The Importance of Information Sharing
- Benefits and challenges associated with sharing threat intelligence.
- Models and frameworks for information sharing (e.g., STIX/TAXII, OpenC2).
Building an Information Sharing Community
- Best practices for establishing a sharing community.
- Legal and ethical considerations.
- Case studies of successful information-sharing initiatives.
Collaborative Threat Intelligence Exercises
- Conducting joint threat analysis.
- Role-playing scenarios for intelligence sharing.
- Developing strategies for effective collaboration.
Advanced Threat Intelligence Techniques
- Application of machine learning and AI in CTI.
- Advanced threat-hunting techniques.
- Emerging trends in CTI.
Case Studies of Cyber Attacks
- Detailed analysis of notable cyber attacks.
- Lessons learned and intelligence insights.
- Practical exercises on developing intelligence reports.
Developing a CTI Program
- Steps to build and mature a CTI program.
- Metrics and KPIs for measuring CTI effectiveness.
Summary and Next Steps
Requirements
- Foundational knowledge of cybersecurity principles and practices.
- Familiarity with network and information security concepts.
- Experience working with IT systems and infrastructure.
Target Audience
- Cybersecurity professionals.
- IT security analysts.
- Staff members of Security Operations Centers (SOC).
Custom Corporate Training
Training solutions designed exclusively for businesses.
- Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
- Flexible Schedule: Dates and times adapted to your team's agenda.
- Format: Online (live), In-company (at your offices), or Hybrid.
Price per private group, online live training, starting from 6500 € + VAT*
Contact us for an exact quote and to hear our latest promotions
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.