From the course: Complete Guide to Cybersecurity: A Practical Approach
Unlock this course with a free trial
Join today to access over 24,500 courses taught by industry experts.
Understanding cyber threat intelligence (CTI)
From the course: Complete Guide to Cybersecurity: A Practical Approach
Understanding cyber threat intelligence (CTI)
- [Instructor] Cyber Threat Intelligence, or for short, CTI, has emerged to be a crucial element in enhancing your organization's cybersecurity posture and informing its decision making process and especially around the world of incident response, digital forensics and threat hunting. At the end of the day, threat intelligence or Cyber Threat Intelligence is the collection, analysis and dissemination of information about existing and emerging cybersecurity threats, right? Also, information about the underlying threat actors, their tactics, their techniques and procedures and the different indicators of compromise. Basically, threat intelligence is designed or you know, the goal is to be designed to provide organizations with actionable insights to help them make informed decisions about their cybersecurity strategy, risk management, and of course, in the world of incident response, to be able to detect threats early or in the world of threat hunting to be able to actually, you know…
Contents
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Module 2: Incident response, digital forensics, and threat hunting introduction39s
-
(Locked)
Learning objectives54s
-
(Locked)
Exploring how to get started in incident response6m 6s
-
(Locked)
Understanding the incident response process5m 46s
-
(Locked)
Defining playbooks and run book automation (RBA)10m 29s
-
(Locked)
Understanding cyber threat intelligence (CTI)10m 23s
-
(Locked)
Understanding data normalization3m 1s
-
(Locked)
Deconstructing universal data formats and 5-tuple correlation1m 19s
-
(Locked)
Understanding security monitoring fundamentals6m 32s
-
(Locked)
Surveying security monitoring tools13m 33s
-
(Locked)
-
-
-
-
-
-
-
-
-
-
-
-
-
-