Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Cyber Threat Intel: Collection Strategies

Turn stakeholder questions into actionable cyber threat intelligence. Learn to define collection requirements, choose ethical collection methods, pull from trusted sources, and prep data (STIX/JSON/CSV) for analysis.

Alexander Shafe - Pluralsight course - Cyber Threat Intel: Collection Strategies
Alexander Shafe
What you'll learn

Organizations drown in data but starve for intelligence. In this course, Cyber Threat Intel: Collection Strategies, you’ll learn to translate business questions into focused intelligence collection and to deliver clean, analysis-ready datasets. First, you’ll plan collections by converting stakeholder needs into prioritized requirements. Next, you’ll select appropriate passive and active techniques, with the right tools and guardrails. Then, you’ll aggregate multi-source reporting and apply structured criteria to vet source quality. Finally, you’ll normalize, tag, and document your collections (STIX/JSON/CSV) so analysts can rapidly pivot. By the end of this course, you’ll be able to stand up defensible, repeatable collection workflows that feed high-quality threat intel outputs.

Table of contents

About the author
Alexander Shafe - Pluralsight course - Cyber Threat Intel: Collection Strategies
Alexander Shafe

Alex is a seasoned Information Security Consultant with over 15 years of experience in the Information Technology (IT) industry. His career spans diverse roles, with a proven track record of excellence in Data Analytics, Business Systems Consulting, and Information Security.

Get access now

Sign up to get immediate access to this course plus thousands more you can watch anytime, anywhere.

Get started with Pluralsight