Analyzing Threat Intelligence for Cyber Defense

5 units

Please select a city/session before registration.

About this program

In the current intricate threat environment, relying solely on reactive security approaches is inadequate. Organizations require actionable threat intelligence to foresee, identify, and counter emerging cyber threats.
This Threat Intelligence Analysis and Cyber Defense Training Course equips participants with hands-on skills to gather, examine, and utilize intelligence for driving proactive defense tactics. The curriculum includes intelligence frameworks, data sources, adversary techniques, and their integration within SOC and incident response operations.
By engaging in case studies, intelligence analysis activities, and simulation labs, attendees will develop the expertise necessary to establish intelligence-led cyber defense initiatives.

Course benefits

  • Enhance defense strategies based on intelligence insights.
  • Evaluate adversary methods and emerging cyber threats.
  • Implement structured frameworks for threat intelligence.
  • Boost the efficiency of SOC and incident response teams.
  • Increase resilience against targeted attacks and advanced persistent threats (APTs).

Key outcomes

  • Understand the core principles of cyber threat intelligence (CTI).
  • Recognize various intelligence sources and collection techniques.
  • Utilize analytical models such as the Diamond Model, Kill Chain, and MITRE ATT&CK.
  • Incorporate CTI into SOC workflows and defense mechanisms.
  • Engage in practical intelligence analysis exercises.
  • Formulate communication tactics for intelligence dissemination.
  • Create sustainable, intelligence-driven defense strategies.

Who should attend

  • Threat intelligence analysts.
  • SOC personnel and incident response teams.
  • Cybersecurity engineers and management professionals.
  • Experts in risk and defense strategy.

Course outline

1

Unit 1: Fundamentals of Cyber Threat Intelligence (CTI)

  • The function of intelligence within cyber defense.
  • Essential terms and the CTI lifecycle.
  • Illustrative examples of intelligence-based defense.
  • Significance of intelligence that drives action.
2

Unit 2: Gathering and Sources of Threat Intelligence

  • Open-source intelligence (OSINT) methods.
  • Commercial and community-based intelligence feeds.
  • Monitoring the dark web and HUMINT techniques.
  • Activity: mapping various intelligence sources.
3

Unit 3: Frameworks for Intelligence Analysis

  • The Diamond Model for intrusion examination.
  • Overview of the Cyber Kill Chain.
  • Using MITRE ATT&CK for adversary profiling.
  • Practical session: applying frameworks to an actual case.
4

Unit 4: Implementing Threat Intelligence in Operations

  • Embedding CTI within SOC processes.
  • Incident response driven by intelligence.
  • CTI management tools and platforms.
  • Simulation exercise: utilizing CTI in attack response.
5

Unit 5: Developing Sustainable Intelligence Programs

  • Cross-industry intelligence sharing via ISACs.
  • Advancing maturity in CTI initiatives.
  • Emerging trends: AI applications in threat intelligence.
  • Strategic roadmap for intelligence-based defense.