Description
With today's increasing challenges of dealing with more aggressive and persistent threat actors, while also being inundated with information that is full of misinformation and false flags across multiple, unconnected systems, how do you pull from that what information is reliable and actionable?
Tags
Syllabus
Module 1: Planning and Direction
Module 2: Collection Plan
Module 3: Data Sources
Module 4: Processing
Module 5: Analysis and Production
Module 6: Dissemination
![](https://d3f1iyfxxz8i1e.cloudfront.net/courses/course_image/83241c02d663.jpeg)
Threat Intelligence Lifecycle Fundamentals
-
TypeOnline Course
-
Provider
With today's increasing challenges of dealing with more aggressive and persistent threat actors, while also being inundated with information that is full of misinformation and false flags across multiple, unconnected systems, how do you pull from that what information is reliable and actionable?
Module 1: Planning and Direction
Module 2: Collection Plan
Module 3: Data Sources
Module 4: Processing
Module 5: Analysis and Production
Module 6: Dissemination