Book Content
chapters • 10h44m total length
1. The Need for Cyber Intelligence
2. Intelligence Development
3. Integrating Cyber Intel, Security, and Operations
4. Using Cyber Intelligence to Enable Active Defense
5. F3EAD For You and For Me
6. Integrating Threat Intelligence and Operations
7. Creating the Collaboration Capability
8. The Security Stack
9. Driving Cyber Intel
10. Baselines and Anomalies
11. Putting Out the Fires
12. Vulnerability Management
13. Risky Business
14. Assigning Metrics
15. Putting It All Together














