- Threat Intelligence Overview
- Intelligence Lifecycle Overview
- Intelligence Requirements
- Collection Requirements
Beginner
Online
4 Weeks
Free
Quick facts
particular | details | |
---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course and certificate fees
Type of course
certificate availability
certificate providing authority
certificate fees
The syllabus
Week 1: Planning and Direction
Videos
Readings
- Threat intelligence and Cybersecurity roles
- ‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving
- Cyber Intelligence Tradecraft Report: The State of Cyber Intelligence Practices in the United States
Practice Exercises
- Threat Intelligence Overview Knowledge Check
- Intelligence Lifecycle Overview Knowledge Check
- Requirements Knowledge Check
- Planning and Direction Graded Assessment
Week 2: Collection Plan
Videos
- Collection Module Intro
- Why an Intelligence Collection Plan?
- Elements of an Effective Intelligence Collection Plan part 1
- Elements of an Effective Intelligence Collection Plan part 2
- Intelligence Collection Plans in Action
- Practical Exercise / Enrichment Homework
Readings
- Collection Plan templates
- Practical Exercise
Practice Exercises
- Why an Intelligence Collection Plan Knowledge Check
- Elements of an Effective Intelligence Collection Plan Knowledge Check
- Intelligence Collection Plans in Action Knowledge Check
- Collection Plan Graded Assessment
Week 3: Data Sources
Videos
- Data Sources Module Intro
- Information vs Intelligence
- Intelligence Collection Disciplines Overview
- HUMINT
- SIGINT
- MASINT and IMINT
- OSINT
- Levels of Information
- What information do you need?
Readings
- Trickbot Rising - Gang Doubles Down on Infection vectors to Amass Network Footholds
- What are the Different Types of Cyberthreat Intelligence?
- List of ransomeware gangs who will steal and leak your data if you don't pay
- Security Intelligence at the Strategic, Operational, and Tactical levels
Practice Exercises
- Information vs Intelligence Knowledge Check
- Intelligence Collection Disciplines
- Levels of Information Knowledge Check
- What Information Do You Need Knowledge Check
- Data Sources Graded Assessment
Week 3: Processing
Videos
- Processing Module Intro
- Consistency, Fidelity, and Searchability
- Automation
Readings
- The Role of Machine Learning in Intelligent Threat Response1
- How AI Can Make Cybersecurity Jobs Less Stressful and More Fulfilling
Practice Exercises
- Consistency, Fidelity, and Searchability Knowledge Check
- Automation Knowlege Check
- Processing Graded Assessment
Week 4: Analysis and Production
Videos
- Analysis and Production Module Intro
- Data, Information, and Intelligence
- Reasoning
- Analytic Process
- Mental Models
Readings
- A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis
Practice Exercises
- Data, Information, and Intelligence Knowledge Check
- Reasoning Knowledge Check
- Analytic Process Knowledge Check
- Mental Models Knowledge Check
- Analysis and Production Graded Assessment
Week 4: Dissemination
Videos
- Dissemination Module Intro
- Know Your Audience
- Types of Intelligence
- Intel Dissemination Map
Readings
- Annual Threat Assessment of the US Intelligence Community
- X-Force Threat Intelligence Index 20221h
- Earn an IBM digital badge
Practice Exercises
- Know Your Audience Knowledge Check
- Types of Intelligence Knowledge Check
- Intel Dissemination Map Knowledge Check
- Dissemination Graded Assessment
Articles
Popular Articles
Latest Articles
Similar Courses
Threat Intelligence Lifecycle Fundamentals
IBM via Edx
Information Technology Fundamentals for Business P...
Polytechnic University of Valencia, Valencia via Edx
Introduction to Cybersecurity Essentials
IBM via Coursera
Check Point Jump Start Cloud Security
Check Point Software Technologies Limited via Coursera
Cybersecurity and Privacy in The Internet of Thing...
Curtin University, Perth via Edx
Cyber Security Certification
Board Infinity
Healthcare Data Security Privacy and Compliance
Johns Hopkins via Coursera
Digital Security Training Cyber Threats and Risk M...
Coventry University, Coventry via Futurelearn
Introduction to Cybersecurity for Business
CU Boulder via Coursera
Courses of your interest
C++ Foundation
PW Skills
Data Science Foundations to Core Bootcamp
Springboard
User Experience Design And Research
UM–Ann Arbor via Futurelearn
Data Analysis with Excel for Complete Beginners
CloudSwyft Global Systems, Inc via Futurelearn
Artificial intelligence Design and Engineering wit...
CloudSwyft Global Systems, Inc via Futurelearn
Data Science Fundamentals on Microsoft Azure
CloudSwyft Global Systems, Inc via Futurelearn
Artificial Intelligence Projects
Great Learning
More Courses by IBM
R Programming Basics for Data Science
IBM via Edx
Introduction to Data Engineering
IBM via Coursera
Relational Database Administration
IBM via Coursera
Introduction to Web Development with HTML CSS Java...
IBM via Coursera
Introduction to Devops
IBM via Coursera
Data Scientist Career Guide and Interview Preparat...
IBM via Coursera
Data Analyst Career Guide and Interview Preparatio...
IBM via Coursera
Introduction to Software Programming and Databases
IBM via Coursera
Introduction to Networking and Storage
IBM via Coursera