Planning and designing a threat intelligence program is one of the most important skills of threat intelligence specialist. This course will teach you how to gather requirements, plan, design, direct and review a threat intelligence program.
Approaching cybersecurity with a threat intelligence mindset is an effective way of reducing the cyber risk of a company. By analyzing the specific threats to our business and ingesting the right threat intelligence data we can effectively tackle potential cyber-attacks. In this course, Threat Intelligence: Requirements, Planning, Direction and Review, you will learn how to implement an effective Threat Intelligence program. First, you will explore how to prepare for a TI program, including how to map the potential threats to your business. Next, you will discover how to gather requirements for your program, which includes both business and technical needs. After that, you will cover how to translate the requirements into a program design. Finally, you will learn how to build a solid Threat Intelligence team and how to share the TI knowledge with the appropriated destinations (such as directors, SOC teams and external parties). When you’re finished with this course, you will have the skills and knowledge required to build an effective threat intelligence program in your company. This course covers the third chapter of the Cyber Threat Intelligence Analyst (C|TIA or CTIA) Certification.
Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 10+ years of IT experience, 6 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
Course Overview Hi, everyone. My name is Ricardo, and welcome to my course, Threat Intelligence: Requirements, Planning, Direction, and Review. I'm a cyber security specialist with years of experience in threat intelligence and offensive security. One of the most efficient ways of tackling cyber security in your company is by adopting a threat intelligence approach. With a threat intelligence program, you'll be able to better understand your threats and also be proactive when protecting against your enemies. In this course, we're going to cover how to plan and design a proper threat intelligence program. In here, we cover some really important topics, such as how to gather the requirements for the threat intelligence program, how to get management buy‑in for the program, how to map your potential threats, how to create a project schedule and estimate your project budget, how to build a strong threat intelligence team, and how to design the threat intelligence sharing strategy for your company. If you're planning to take the Cyber Threat Intelligence Analyst certification, you're in the right place. In here, we cover the third chapter of the CTIA certification, as well as some additional topics that are essential for a threat intelligence specialist. By the end of this course, you'll be able to fully plan and design a threat intelligence program for your company. So I hope you'll join me on this journey to learn about threat intelligence with the Requirements, Planning, Direction, and Review course here, at Pluralsight.