• Online, Self-Paced
Course Description

Security incidents have become harder to detect, mostly because of the increase in malware complexity and variety. In this course, Threat Intelligence: The Big Picture, you'll learn the foundational knowledge of Cyber Threat Intelligence. First, you'll explore how to classify indicators of compromise using industry standard methodologies. Next, you'll discover how to search for and consume existing intelligence about the threats that you're dealing with. Finally, you'll cover how to maintain the quality of malware detections with a solid set of best practices. When you're finished with this course, you'll have the skills and the knowledge of threat intelligence to implement it into your current incident handline process.

Learning Objectives

  • The Current Threat Landscape
  • Threat Intelligence Methodologies
  • Sharing and Ingesting Intelligence
  • Searching for Indicators of Compromise

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • All-Source Analysis
  • Cyber Defense Analysis
  • Exploitation Analysis
  • Incident Response

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.