This course explores latest techniques and technologies related to cyber threat intelligence. In addition, it will help students understand various sources of threat intelligence, creating a novel cyber-threat intelligence platform; employing analytics techniques on traditional intelligence data feed and hacker community datasets (e.g., Hacker Forums, IRC channels, DarkNet marketplaces). In addition, it enables the students to identify and collect intelligence feeds from various sources, such as the Common Intelligence Model (CIF's), Trusted Automated eXchange of Intelligence Information (TAXII), and Security Information and Event Management (SIEM).
Undergraduate 132 CRs
Bob Stasio, Cyber Threat Intelligence, Wiley
content serial | Description |
---|
1 | Introduction to Cyber Threat Intelligence |
2 | Sources of Threat Intelligence |
3 | Creating a Cyber-Threat Intelligence Platform |
4 | Analytics Techniques for Traditional Intelligence Data Feeds |
5 | Analyzing Hacker Community Datasets |
6 | Identifying and Collecting Intelligence Feeds |
7 | 7th Week Assessment |
8 | The Common Intelligence Model (CIF's) |
9 | Trusted Automated eXchange of Intelligence Information (TAXII) |
10 | Security Information and Event Management (SIEM) |
11 | Threat Indicators and Data Enrichment |
12 | 12th Week Assessment |
13 | Threat Intelligence Sharing and Collaboration |
14 | Threat Intelligence in Incident Response |
15 | Emerging Trends in Cyber Threat Intelligence |
Start your application