Book Content
chapters • 15h20m total length
1. Why You Need a Threat Intelligence Program
2. Threat Actors, Campaigns, and Tooling
3. Guidelines and Policies
4. Threat Intelligence Frameworks, Standards, Models, and Platforms
5. Operational Security (OPSEC)
6. Technical Threat Intelligence – Collection
7. Technical Threat Analysis – Enrichment
8. Technical Threat Analysis – Threat Hunting and Pivoting
9. Technical Threat Analysis – Similarity Analysis
10. Preparation and Dissemination
11. Fusion into Other Enterprise Operations
12. Overview of Datasets and Their Practical Application
13. Conclusion














