Security incidents have become harder to detect, mostly because of the increase in malware complexity and variety. In this course, Threat Intelligence: The Big Picture, you'll learn the foundational knowledge of Cyber Threat Intelligence. First, you'll explore how to classify indicators of compromise using industry standard methodologies. Next, you'll discover how to search for and consume existing intelligence about the threats that you're dealing with. Finally, you'll cover how to maintain the quality of malware detections with a solid set of best practices. When you're finished with this course, you'll have the skills and the knowledge of threat intelligence to implement it into your current incident handline process.
Learning Objectives
- The Current Threat Landscape
- Threat Intelligence Methodologies
- Sharing and Ingesting Intelligence
- Searching for Indicators of Compromise
Framework Connections
Specialty Areas
- All-Source Analysis
- Cyber Defense Analysis
- Exploitation Analysis
- Incident Response
Feedback
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.