Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Cyber Threat Intel: Collection Strategies

Turn stakeholder questions into actionable cyber threat intelligence. Learn to define collection requirements, choose ethical collection methods, pull from trusted sources, and prep data (STIX/JSON/CSV) for analysis.

Intermediate
1h 16m

Created by Alexander Shafe

Last Updated Nov 12, 2025

Course Thumbnail
  • Course

Cyber Threat Intel: Collection Strategies

Turn stakeholder questions into actionable cyber threat intelligence. Learn to define collection requirements, choose ethical collection methods, pull from trusted sources, and prep data (STIX/JSON/CSV) for analysis.

Intermediate
1h 16m

Created by Alexander Shafe

Last Updated Nov 12, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Organizations drown in data but starve for intelligence. In this course, Cyber Threat Intel: Collection Strategies, you’ll learn to translate business questions into focused intelligence collection and to deliver clean, analysis-ready datasets. First, you’ll plan collections by converting stakeholder needs into prioritized requirements. Next, you’ll select appropriate passive and active techniques, with the right tools and guardrails. Then, you’ll aggregate multi-source reporting and apply structured criteria to vet source quality. Finally, you’ll normalize, tag, and document your collections (STIX/JSON/CSV) so analysts can rapidly pivot. By the end of this course, you’ll be able to stand up defensible, repeatable collection workflows that feed high-quality threat intel outputs.

Cyber Threat Intel: Collection Strategies
Intermediate
1h 16m
Table of contents

About the author
Alexander Shafe - Pluralsight course - Cyber Threat Intel: Collection Strategies
Alexander Shafe
4 courses 0.0 author rating 0 ratings

Alex is a seasoned Information Security Consultant with over 15 years of experience in the Information Technology (IT) industry. His career spans diverse roles, with a proven track record of excellence in Data Analytics, Business Systems Consulting, and Information Security.

Get started with Pluralsight