What the industry deems “Threat Intelligence” is too often shortsighted and mislabeled, leaving security analysts chasing indicators around like some game of cat and mouse. Intelligence is supposed to change that game.
The frustration is over. The CIAO course was designed by seasoned military intelligence and cyber operators that can give you the tools to be successful in intelligence driven cyber operations. It’s time to finally get ahead of the adversary.
Learn:
The ins and outs of all stages of the intelligence cycle from collection to analysis from seasoned intel professionals.
How to employ threat intelligence to conduct comprehensive defense strategies to mitigate potential compromise.
How to use TI to respond to and minimize impact of cyber incidents.
How to generate comprehensive and actionable reports to communicate gaps in defenses and intelligence findings to decision makers.Applying our Threat Intelligence methodology additionally allows you to cut cybersecurity operating costs by determining where you actually need resources and making more efficient use of the tools you have available.
Stop relying on the “Hope Strategy” to protect against advanced threats and continue having frustrating discussions with decision makers about what you need to secure your network. Sign up today to gain control of your cyber program by learning how to apply a threat-based defense strategy and how intelligence can completely revitalize your existing cyber program.
Learning Objectives
This course is designed to give cyber operators the ability to conduct ongoing cyber intelligence analysis to augment their cyber programs to be faster, cheaper and more effective.
Framework Connections
- Cyberspace Intelligence
- Design and Development
- Investigation
- Oversight and Governance
- Protection and Defense
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Defense Analysis
- Cyber Investigation
- Cybersecurity Management
- Threat Analysis
- Risk Management
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.