Price:
$2,495.00
Days:
1
Virtual
• Importance of threat intelligence in risk management, SIEM, and incident response
• Various types of cyber threats, threat actors, and their motives, goals, and objectives of cybersecurity attacks
• Fundamentals of threat intelligence (including threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, etc.)
• Various steps involved in planning a threat intelligence program (Requirements, Planning, Direction, and Review)
• Different types of data feeds, sources, and data collection methods
• Different data analysis, threat modeling, and threat intelligence tools
• Creating effective threat intelligence reports
• Minimum of 2 years working experience in information security.
• Introduction to Threat Intelligence
• Introduction to Threat Intelligence
• Introduction to Threat Intelligence
• Introduction to Threat Intelligence
• Cyber Threats and Kill Chain Methodology
• Cyber Threats and Kill Chain Methodology
• Cyber Threats and Kill Chain Methodology
• Cyber Threats and Kill Chain Methodology
• Requirements, Planning, Direction, and Review
• Requirements, Planning, Direction, and Review
• Requirements, Planning, Direction, and Review
• Requirements, Planning, Direction, and Review
• Data Collection and Processing
• Data Collection and Processing
• Data Collection and Processing
• Data Collection and Processing
• Data Analysis
• Data Analysis
• Data Analysis
• Data Analysis
• Intelligence Reporting and Dissemination
• Intelligence Reporting and Dissemination
• Intelligence Reporting and Dissemination
• Intelligence Reporting and Dissemination
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.