Book

Operationalizing Threat Intelligence

This book introduces readers to the fundamentals of operationalizing cyber threat intelligence using intelligence about malware, adversaries, their capabilities, and techniques. You’ll explore the fundamentals of how to collect, analyze, and implement threat intelligence to enable tactical and strategic decision-making.

Offered byPackt Logo

Difficulty Level

Intermediate

Completion Time

15h20m

Language

English

About Book

Who Is This Book For?

This book is for cybersecurity professionals, security analysts, security enthusiasts, and anyone who is just getting started and looking to explore threat intelligence in more detail. Those working in different security roles will also be able to explore threat intelligence with the help of this security book.

Book content

chapters 15h20m total length

Why You Need a Threat Intelligence Program

Threat Actors, Campaigns, and Tooling

Guidelines and Policies

Threat Intelligence Frameworks, Standards, Models, and Platforms

Operational Security (OPSEC)

Technical Threat Intelligence – Collection

Technical Threat Analysis – Enrichment

Technical Threat Analysis – Threat Hunting and Pivoting

Technical Threat Analysis – Similarity Analysis

Preparation and Dissemination

Fusion into Other Enterprise Operations

Overview of Datasets and Their Practical Application

Conclusion

Related Resources

Access Ready-to-Use Books for Free!

Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!

No credit card required