Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn't?
ofrecido por


Introduction to the Threat Intelligence Lifecycle
IBMAcerca de este Curso
ofrecido por

IBM
IBM is the global leader in business transformation through an open hybrid cloud platform and AI, serving clients in more than 170 countries around the world. Today 47 of the Fortune 50 Companies rely on the IBM Cloud to run their business, and IBM Watson enterprise AI is hard at work in more than 30,000 engagements. IBM is also one of the world’s most vital corporate research organizations, with 28 consecutive years of patent leadership. Above all, guided by principles for trust and transparency and support for a more inclusive society, IBM is committed to being a responsible technology innovator and a force for good in the world.
Programa - Qué aprenderás en este curso
Planning and Direction
The first step in the Threat Intelligence Lifecycle is Planning and Direction. In this module, you will learn how to identify the different types of intelligence and requirements.
Collection Plan
The next step in the Threat Intelligence Lifecycle is Collection. In this module, you will learn about the importance of having a comprehensive Collection Plan.
Data Sources
In the Collection phase, you will work with various data sources. In this module, you will learn about different data sources, collection disciplines, and the levels of information.
Processing
In this module, you will learn about the third phase of the Threat Intelligence Lifecycle, processing, and discuss how to process intelligence data.
Analysis and Production
In this module, you will learn about the fourth phase of the Threat Intelligence Lifecycle to analyze and produce intelligence.
Dissemination
The fifth phase of the Threat Intelligence Lifecycle is Dissemination. In this module, you will learn the different audiences who might consume intelligence and how to tailor the type of intelligence to that audience.
Preguntas Frecuentes
¿Cuándo podré acceder a las lecciones y tareas?
¿Qué recibiré si compro el Certificado?
¿Hay ayuda económica disponible?
¿Tienes más preguntas? Visita el Centro de Ayuda al Alumno.