- Threat Intelligence Overview
- Intelligence Lifecycle Overview
- Intelligence Requirements
- Collection Requirements
Introduction to the Threat Intelligence Lifecycle
Quick Facts
particular | details | ||||
---|---|---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Learning efforts
5 Hours Per Week
|
Course and certificate fees
Type of course
Free
certificate availability
Yes
certificate providing authority
Coursera
certificate fees
₹2,436
The syllabus
Module 1: Planning and Direction
Videos
Readings
- Threat intelligence and Cybersecurity roles
- ‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving
- Cyber Intelligence Tradecraft Report: The State of Cyber Intelligence Practices in the United States
Practice Exercises
- Threat Intelligence Overview Knowledge Check
- Intelligence Lifecycle Overview Knowledge Check
- Requirements Knowledge Check
- Planning and Direction Graded Assessment
Module 2: Collection Plan
Videos
- Collection Module Intro
- Why an Intelligence Collection Plan?
- Elements of an Effective Intelligence Collection Plan part 1
- Elements of an Effective Intelligence Collection Plan part 2
- Intelligence Collection Plans in Action
- Practical Exercise / Enrichment Homework
Readings
- Collection Plan templates
- Practical Exercise
Practice Exercises
- Why an Intelligence Collection Plan Knowledge Check
- Elements of an Effective Intelligence Collection Plan Knowledge Check
- Intelligence Collection Plans in Action Knowledge Check
- Collection Plan Graded Assessment
Module 3: Data Sources
Videos
- Data Sources Module Intro
- Information vs Intelligence
- Intelligence Collection Disciplines Overview
- HUMINT
- SIGINT
- MASINT and IMINT
- OSINT
- Levels of Information
- What information do you need?
Readings
- Trickbot Rising - Gang Doubles Down on Infection vectors to Amass Network Footholds
- What are the Different Types of Cyberthreat Intelligence?
- List of ransomeware gangs who will steal and leak your data if you don't pay
- Security Intelligence at the Strategic, Operational, and Tactical levels
Practice Exercises
- Information vs Intelligence Knowledge Check
- Intelligence Collection Disciplines
- Levels of Information Knowledge Check
- What Information Do You Need Knowledge Check
- Data Sources Graded Assessment
Module 4: Processing
Videos
- Processing Module Intro
- Consistency, Fidelity, and Searchability
- Automation
Readings
- The Role of Machine Learning in Intelligent Threat Response1
- How AI Can Make Cybersecurity Jobs Less Stressful and More Fulfilling
Practice Exercises
- Consistency, Fidelity, and Searchability Knowledge Check
- Automation Knowlege Check
- Processing Graded Assessment
Module 5: Analysis and Production
Videos
- Analysis and Production Module Intro
- Data, Information, and Intelligence
- Reasoning
- Analytic Process
- Mental Models
Readings
- A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis
Practice Exercises
- Data, Information, and Intelligence Knowledge Check
- Reasoning Knowledge Check
- Analytic Process Knowledge Check
- Mental Models Knowledge Check
- Analysis and Production Graded Assessment
Module 6: Dissemination
Videos
- Dissemination Module Intro
- Know Your Audience
- Types of Intelligence
- Intel Dissemination Map
Readings
- Annual Threat Assessment of the US Intelligence Community
- X-Force Threat Intelligence Index 20221h
- Earn an IBM digital badge
Practice Exercises
- Know Your Audience Knowledge Check
- Types of Intelligence Knowledge Check
- Intel Dissemination Map Knowledge Check
- Dissemination Graded Assessment
Articles
Popular Articles
Latest Articles
Similar Courses


Microsoft Future Ready Fundamentals of Enterprise ...
CloudSwyft Global Systems, Inc via Futurelearn


Threat Intelligence Lifecycle Fundamentals
IBM via Edx

Information Technology Fundamentals for Business P...
Polytechnic University of Valencia, Valencia via Edx


Introduction to Cybersecurity Essentials
IBM via Coursera

Check Point Jump Start Cloud Security
Check Point Software Technologies Limited via Coursera


Cybersecurity and Privacy in The Internet of Thing...
Curtin University, Perth via Edx


Cyber Security Certification
Board Infinity

Information Security for Beginners
EC-Council via Futurelearn


Healthcare Data Security Privacy and Compliance
Johns Hopkins via Coursera


Digital Security Training Cyber Threats and Risk M...
Coventry University, Coventry via Futurelearn
Courses of your Interest
C++ Foundation
PW Skills
Advanced CFD Meshing using ANSA
Skill Lync
Data Science Foundations to Core Bootcamp
Springboard

User Experience Design And Research
UM–Ann Arbor via Futurelearn

Fundamentals of Agile Project Management
UCI Irvine via Futurelearn

Artificial intelligence Design and Engineering wit...
CloudSwyft Global Systems, Inc via Futurelearn
More Courses by IBM
R Programming Basics for Data Science
IBM via Edx
Introduction to Data Engineering
IBM via Coursera
Introduction to Web Development with HTML CSS Java...
IBM via Coursera
Introduction to Devops
IBM via Coursera
Data Scientist Career Guide and Interview Preparat...
IBM via Coursera
Data Analyst Career Guide and Interview Preparatio...
IBM via Coursera
Introduction to Software Programming and Databases
IBM via Coursera
Introduction to Networking and Storage
IBM via Coursera
Assessment for Data Analysis and Visualization Fou...
IBM via Coursera