Threat Intelligence & Information Sharing


In this course, you’ll learn how to proactively test what you have put in place to protect your data. You’ll be able to discuss the basics of deterrents and how to “trick” attackers into believing they’ve hit a goldmine of data away from your real systems. You’ll be able to understand and discuss the steps of penetration testing methodology. You will also be able to understand and apply what you have learned on your own systems to test whether your systems are secure or not. We’ll discuss planning for your own methodology that you can apply to your own systems.


Cyber threat intelligence is a rapidly growing field. However, intelligence was a profession long before the word “cyber” entered the lexicon. Understanding the key points regarding intelligence terminology, tradecraft, and impact is vital to understanding and using cyber threat intelligence. This section introduces students to the most important concepts of intelligence, analysis tradecraft, and levels of threat intelligence, and the value they can add to organizations. It also focuses on getting your intelligence program off to the right start with planning, direction, and the generation of intelligence requirements. As with all sections, the day includes immersive hands-on labs to ensure that students have the ability to turn theory into practice.

Audience: Basic & Technical Teams
Delivery Method: Live on-line, On-Demand, In-Person
Duration: 8 Weeks
CPE Credits: 22


Click here to Download Course Outline