Section 1: Cyber Threat Intelligence
In this section, you will learn about the basis of cyber threat intelligence. We will go through the different types of threats, the different stages of a cyberattack, and the process of collecting Indicators of Compromise (IoCs) and how to analyze the collected information. Afterward, we will present threat hunting as a discipline, including the different approaches that have been proposed for the threat hunting process.
The section comprises the following chapters:
- Chapter 1, What is Cyber Threat Intelligence?
- Chapter 2, What is Threat Hunting?
- Chapter 3, Where Does the Data Come From?