Featured resource
2025 Tech Upskilling Playbook
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Check it out
  • Course

Cyber Threat Intel: Strategic Priorities

Cyber threat intelligence is vital to modern security operations. This course will teach you how to analyze, apply, and evaluate threat intelligence to support informed security decisions.

Intermediate
1h 11m
(1)

Created by Kevin James

Last Updated Aug 13, 2025

Course Thumbnail
  • Course

Cyber Threat Intel: Strategic Priorities

Cyber threat intelligence is vital to modern security operations. This course will teach you how to analyze, apply, and evaluate threat intelligence to support informed security decisions.

Intermediate
1h 11m
(1)

Created by Kevin James

Last Updated Aug 13, 2025

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Organizations struggle to keep up with evolving threats without clear, actionable intelligence. In this course, Cyber Threat Intel: Strategic Priorities, you’ll learn to analyze, apply, and evaluate cyber threat intelligence to support informed security decisions. First, you’ll explore the purpose and impact of threat intelligence across strategic, operational, and tactical levels. Next, you’ll discover how the intelligence lifecycle turns raw data into useful insights through structured collection, analysis, and feedback. Finally, you’ll learn how to assess different intelligence sources and apply core concepts like indicators, observables, and TTPs in real-world scenarios. When you’re finished with this course, you’ll have the skills and knowledge of threat intelligence needed to strengthen security operations and support risk-based decision-making.

Cyber Threat Intel: Strategic Priorities
Intermediate
1h 11m
(1)
Table of contents

About the author
Kevin James - Pluralsight course - Cyber Threat Intel: Strategic Priorities
Kevin James
21 courses 4.1 author rating 44 ratings

As a seasoned technologist with over 30 years of wide-ranging expertise in information technology roles across diverse industries, Kevin is passionate about finding effective and economical solutions to business problems. His passion for teaching technical subjects allows him to have a particular style that imparts information yet teaches at the same time. He enjoys working with Linux, Unix and Windows Operating Systems and combined with a deep knowledge of software platforms as varied as Apache, MySQL, and others, has enabled him to successfully manage and maintain server infrastructures of all sizes, with his largest project encompassing over 800 servers across 4 continents. He believes in leveraging technology as a tool to make lives better and business flow more efficiently.

2025 Forrester Wave™ names Pluralsight as a Leader among tech skills dev platforms

See how our offering and strategy stack up.

forrester wave report