- Course
- Security
Cyber Threat Intel: Collection Strategies
Turn stakeholder questions into actionable cyber threat intelligence. Learn to define collection requirements, choose ethical collection methods, pull from trusted sources, and prep data (STIX/JSON/CSV) for analysis.
What you'll learn
Organizations drown in data but starve for intelligence. In this course, Cyber Threat Intel: Collection Strategies, you’ll learn to translate business questions into focused intelligence collection and to deliver clean, analysis-ready datasets. First, you’ll plan collections by converting stakeholder needs into prioritized requirements. Next, you’ll select appropriate passive and active techniques, with the right tools and guardrails. Then, you’ll aggregate multi-source reporting and apply structured criteria to vet source quality. Finally, you’ll normalize, tag, and document your collections (STIX/JSON/CSV) so analysts can rapidly pivot. By the end of this course, you’ll be able to stand up defensible, repeatable collection workflows that feed high-quality threat intel outputs.
Table of contents
About the author
Alex is a seasoned Information Security Consultant with over 15 years of experience in the Information Technology (IT) industry. His career spans diverse roles, with a proven track record of excellence in Data Analytics, Business Systems Consulting, and Information Security.