Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn't?

Introduction to the Threat Intelligence Lifecycle
IBMÜber diesen Kurs
von

IBM
IBM is the global leader in business transformation through an open hybrid cloud platform and AI, serving clients in more than 170 countries around the world. Today 47 of the Fortune 50 Companies rely on the IBM Cloud to run their business, and IBM Watson enterprise AI is hard at work in more than 30,000 engagements. IBM is also one of the world’s most vital corporate research organizations, with 28 consecutive years of patent leadership. Above all, guided by principles for trust and transparency and support for a more inclusive society, IBM is committed to being a responsible technology innovator and a force for good in the world.
Lehrplan - Was Sie in diesem Kurs lernen werden
Planning and Direction
The first step in the Threat Intelligence Lifecycle is Planning and Direction. In this module, you will learn how to identify the different types of intelligence and requirements.
Collection Plan
The next step in the Threat Intelligence Lifecycle is Collection. In this module, you will learn about the importance of having a comprehensive Collection Plan.
Data Sources
In the Collection phase, you will work with various data sources. In this module, you will learn about different data sources, collection disciplines, and the levels of information.
Processing
In this module, you will learn about the third phase of the Threat Intelligence Lifecycle, processing, and discuss how to process intelligence data.
Analysis and Production
In this module, you will learn about the fourth phase of the Threat Intelligence Lifecycle to analyze and produce intelligence.
Dissemination
The fifth phase of the Threat Intelligence Lifecycle is Dissemination. In this module, you will learn the different audiences who might consume intelligence and how to tailor the type of intelligence to that audience.
Häufig gestellte Fragen
Wann erhalte ich Zugang zu den Vorträgen und Aufgaben?
Was bekomme ich, wenn ich das Zertifikat erwerbe?
Ist finanzielle Unterstützung möglich?
Haben Sie weitere Fragen? Besuchen Sie das Learner Help Center.