This course is designed to transition security professionals from foundational concepts of the Intelligence Lifecycle to the expert-level application of Structured Analytic Techniques (SATs), rigorous adversary tracking, and the operational integration of Cyber Threat Intelligence (CTI). Participants will move beyond simple Indicator of Compromise (IoC) consumption to strategically refining intelligence requirements, performing robust attribution, and automating Cyber Threat Intelligence (CTI) within security controls (SIEM, SOAR, EDR) for proactive defense and TTP-based threat hunting.
Prerequisites
To get the most of this session, participants should have introductory knowledge equivalent to completing basic courses on threat modeling and the intelligence lifecycle to include:
- The four stages of the Intelligence Lifecycle (Planning, Collection, Analysis, Dissemination)
- Basic cyber defense technologies (SIEM, EDR) and their roles
- The concepts of Indicators of Compromise (IoCs) and basic TTPs (Tactics, Techniques, and Procedures)
Â
Purpose
| Apply Structured Analytic Techniques (SATs), rigorous adversary tracking, and the operational integration of Cyber Threat Intelligence (CTI |
Audience
| IT and Security Professionals ;ooking to expnd concepets of the Intelligence Lifecycle beyond oundational concepts |
Role
| Cyber Threat Intelligence (CTI) Analysts |Â Threat Hunters |Â Security Engineers responsible for SIEM/SOAR integration |Â Incident Responders who rely on contextual intelligence |Â Security Analysts looking to specialize in intelligence production
|
Skill level
| Intermediate |
Style
| Lecture | Hands-on Activities |
Duration
| 5 days |
Related technologies
| Threat Modeling | Cloud | Networking |
Â
Learning objectives
- Design and manage complex Priority Intelligence Requirements (PIRs)
- Apply formal Structured Analytic Techniques (SATs)
- Conduct Advanced Profiling utilizing the MITRE ATT&CK framework
- Operationalize CTI
- Evaluate and analyze specialized threat domains (OT/ICS, Supply Chain)