Chapter 12: Overview of Datasets and Their Practical Application
Throughout this book, we have introduced a lot of concepts that have focused on operationalizing threat intelligence. In this chapter, we will focus on tying all these concepts together by applying them within a real-life scenario. We will be working our way through each of the phases of the intelligence life cycle we introduced to you in Chapter 1, Why You Need a Threat Intelligence Program. We will start with planning and direction by focusing on creating and developing a general intelligence requirement, followed by a prioritized collection requirement, to kick off our intelligence life cycle. Then, we will take this guidance to introduce you to the scenario we will focus on in each stage of the intelligence life cycle.
As we walk through each phase, we will introduce you to the guidance that is created, the different data that's collected, and the datasets that will be produced. While doing so, we will focus...