Cyber Threat Intelligence

  • Cybersecurity |

Description

This course explores latest techniques and technologies related to cyber threat intelligence. In addition, it will help students understand various sources of threat intelligence, creating a novel cyber-threat intelligence platform; employing analytics techniques on traditional intelligence data feed and hacker community datasets (e.g., Hacker Forums, IRC channels, DarkNet marketplaces). In addition, it enables the students to identify and collect intelligence feeds from various sources, such as the Common Intelligence Model (CIF's), Trusted Automated eXchange of Intelligence Information (TAXII), and Security Information and Event Management (SIEM).

Program

Undergraduate 132 CRs

Objectives

  • - Equip students with a deep understanding of cyber threat intelligence, focusing on the latest techniques and technologies in the field.
    - Enable students to identify and utilize various sources of threat intelligence, including the creation of innovative cyber-threat intelligence platforms.
    - Teach students how to apply analytics techniques to both traditional intelligence data feeds and hacker community datasets, such as Hacker Forums, IRC channels, and DarkNet marketplaces.
    - Empower students to identify and collect intelligence feeds from diverse sources, including the Common Intelligence Model (CIF's), Trusted Automated eXchange of Intelligence Information (TAXII), and Security Information and Event Management (SIEM).
    - Prepare students to contribute effectively to the field of cyber threat intelligence, addressing the evolving landscape of digital threats.

Textbook

Bob Stasio, Cyber Threat Intelligence, Wiley

Course Content

content serial Description
1Introduction to Cyber Threat Intelligence
2Sources of Threat Intelligence
3Creating a Cyber-Threat Intelligence Platform
4Analytics Techniques for Traditional Intelligence Data Feeds
5Analyzing Hacker Community Datasets
6Identifying and Collecting Intelligence Feeds
77th Week Assessment
8The Common Intelligence Model (CIF's)
9Trusted Automated eXchange of Intelligence Information (TAXII)
10Security Information and Event Management (SIEM)
11Threat Indicators and Data Enrichment
1212th Week Assessment
13Threat Intelligence Sharing and Collaboration
14Threat Intelligence in Incident Response
15Emerging Trends in Cyber Threat Intelligence

Markets and Career

  • Generation, transmission, distribution and utilization of electrical power for public and private sectors to secure both continuous and emergency demands.
  • Electrical power feeding for civil and military marine and aviation utilities.
  • Electrical works in construction engineering.

Start your application

Start The your journey to your new career.