Security incidents have become harder to detect, mostly because of the increase in malware complexity and variety. In this course, Threat Intelligence: The Big Picture, you'll learn the foundational knowledge of Cyber Threat Intelligence. First, you'll explore how to classify indicators of compromise using industry standard methodologies. Next, you'll discover how to search for and consume existing intelligence about the threats that you're dealing with. Finally, you'll cover how to maintain the quality of malware detections with a solid set of best practices. When you're finished with this course, you'll have the skills and the knowledge of threat intelligence to implement it into your current incident handline process.
The Current Threat Landscape
Threat Intelligence Methodologies
Sharing and Ingesting Intelligence
Searching for Indicators of Compromise
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.