- Level Foundation
- المدة 15 ساعات hours
- الطبع بواسطة IBM
-
Offered by
عن
Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn't? The Threat Intelligence lifecycle is the planning, collecting, processing, analyzing, and disseminating of information to help mitigate potential attacks and harmful events by treat actors. In this course, you will learn to: - Describe the different phases of the Threat Intelligence lifecycle - Explain the levels of information - Identify different intelligence data sources - Explain procedures and techniques used to process and analyze information - Discuss distributing intelligence to different audiencesالوحدات
Threat Intelligence Overview
1
Assignment
- Threat Intelligence Overview Knowledge Check
1
Videos
- Threat Intelligence Overview
3
Readings
- Threat intelligence and Cybersecurity roles
- ‘Clear and Present Danger’: Why Cybersecurity Risk Management Needs to Keep Evolving
- Cyber Intelligence Tradecraft Report: The State of Cyber Intelligence Practices in the United States
Intelligence Lifecycle Overview
1
Assignment
- Intelligence Lifecycle Overview Knowledge Check
1
Videos
- Intelligence Lifecycle Overview
Requirements
1
Assignment
- Requirements Knowledge Check
2
Videos
- Intelligence Requirements
- Collection Requirements
Planning and Direction Graded Assessment
1
Assignment
- Planning and Direction Graded Assessment
Why an Intelligence Collection Plan?
1
Assignment
- Why an Intelligence Collection Plan Knowledge Check
2
Videos
- Collection module intro
- Why an Intelligence Collection Plan?
Elements of an Effective Intelligence Collection Plan
1
Assignment
- Elements of an Effective Intelligence Collection Plan Knowledge Check
2
Videos
- Elements of an Effective Intelligence Collection Plan part 1
- Elements of an Effective Intelligence Collection Plan part 2
Intelligence Collection Plans in Action
1
Assignment
- Intelligence Collection Plans in Action Knowledge Check
1
Videos
- Intelligence Collection Plans in Action
Practical Exercise / Enrichment Homework
1
Videos
- Practical Exercise / Enrichment Homework
2
Readings
- Collection Plan templates
- Practical Exercise
Collection Plan Graded Assessment
1
Assignment
- Collection Plan Graded Assessment
Information vs Intelligence
1
Assignment
- Information vs Intelligence Knowledge Check
2
Videos
- Data Sources module intro
- Information vs Intelligence
Intelligence Collection Disciplines
1
Assignment
- Intelligence Collection Disciplines
5
Videos
- Intelligence Collection Disciplines Overview
- HUMINT
- SIGINT
- MASINT and IMINT
- OSINT
3
Readings
- Trickbot Rising - Gang Doubles Down on Infection vectors to Amass Network Footholds
- What are the Different Types of Cyberthreat Intelligence?
- List of ransomeware gangs who will steal and leak your data if you don't pay
Levels of Information
1
Assignment
- Levels of Information Knowledge Check
1
Videos
- Levels of Information
1
Readings
- Security Intelligence at the Strategic, Operational, and Tactical levels
What information do you need?
1
Assignment
- What Information Do You Need Knowledge Check
1
Videos
- What information do you need?
Data Sources Graded Assessment
1
Assignment
- Data Sources Graded Assessment
Consistency, Fidelity, and Searchability
1
Assignment
- Consistency, Fidelity, and Searchability Knowledge Check
2
Videos
- Processing module intro
- Consistency, Fidelity, and Searchability
Automation
1
Assignment
- Automation Knowlege Check
1
Videos
- Automation
2
Readings
- The Role of Machine Learning in Intelligent Threat Response
- How AI Can Make Cybersecurity Jobs Less Stressful and More Fulfilling
Processing Graded Assessment
1
Assignment
- Processing Graded Assessment
Data, Information, and Intelligence
1
Assignment
- Data, Information, and Intelligence Knowledge Check
2
Videos
- Analysis and Production module intro
- Data, Information, and Intelligence
Reasoning
1
Assignment
- Reasoning Knowledge Check
1
Videos
- Reasoning
Analytic Process
1
Assignment
- Analytic Process Knowledge Check
1
Videos
- Analytic Process
1
Readings
- A Tradecraft Primer: Structured Analytic Techniques for Improving Intelligence Analysis
Mental Models
1
Assignment
- Mental Models Knowledge Check
1
Videos
- Mental Models
Analysis and Production Graded Assessment
1
Assignment
- Analysis and Production Graded Assessment
Know Your Audience
1
Assignment
- Know Your Audience Knowledge Check
2
Videos
- Dissemination module intro
- Know Your Audience
Types of Intelligence
1
Assignment
- Types of Intelligence Knowledge Check
1
Videos
- Types of Intelligence
Intel Dissemination Map
1
Assignment
- Intel Dissemination Map Knowledge Check
1
Videos
- Intel Dissemination Map
Dissemination Graded Assessment
1
Assignment
- Dissemination Graded Assessment
Annual reports
2
Readings
- Annual Threat Assessment of the US Intelligence Community
- X-Force Threat Intelligence Index 2022
Earn an IBM digital badge
1
Readings
- Earn an IBM digital badge
Auto Summary
Dive into the world of cybersecurity with "Introduction to the Threat Intelligence Lifecycle," a foundational course offered by Coursera in the domain of IT & Computer Science. This engaging course is designed to equip you with the essential skills to navigate the complex landscape of modern threats posed by aggressive and persistent threat actors. Throughout this course, you'll explore the comprehensive Threat Intelligence lifecycle, which encompasses the planning, collecting, processing, analyzing, and disseminating of information crucial for mitigating potential cyber attacks. You'll gain insights into distinguishing reliable and actionable intelligence from misinformation and false flags. Key learning outcomes include understanding the different phases of the Threat Intelligence lifecycle, identifying various intelligence data sources, and mastering procedures and techniques for processing and analyzing information. Additionally, you'll learn how to effectively distribute intelligence to diverse audiences. With a total duration of 900 minutes, the course offers flexible subscription options tailored to your needs, including Starter and Professional plans. Whether you're an aspiring cybersecurity professional or someone looking to enhance your IT knowledge, this course provides a solid foundation to help you stay ahead in the ever-evolving field of threat intelligence.

IBM Skills Network Team