Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

IBM

Introduction to the Threat Intelligence Lifecycle

IBM via Coursera

Overview

Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn't? The Threat Intelligence lifecycle is the planning, collecting, processing, analyzing, and disseminating of information to help mitigate potential attacks and harmful events by treat actors. In this course, you will learn to: - Describe the different phases of the Threat Intelligence lifecycle - Explain the levels of information - Identify different intelligence data sources - Explain procedures and techniques used to process and analyze information - Discuss distributing intelligence to different audiences

Syllabus

  • Planning and Direction
    • The first step in the Threat Intelligence Lifecycle is Planning and Direction. In this module, you will learn how to identify the different types of intelligence and requirements.
  • Collection Plan
    • The next step in the Threat Intelligence Lifecycle is Collection. In this module, you will learn about the importance of having a comprehensive Collection Plan.
  • Data Sources
    • In the Collection phase, you will work with various data sources. In this module, you will learn about different data sources, collection disciplines, and the levels of information.
  • Processing
    • In this module, you will learn about the third phase of the Threat Intelligence Lifecycle, processing, and discuss how to process intelligence data.
  • Analysis and Production
    • In this module, you will learn about the fourth phase of the Threat Intelligence Lifecycle to analyze and produce intelligence.
  • Dissemination
    • The fifth phase of the Threat Intelligence Lifecycle is Dissemination. In this module, you will learn the different audiences who might consume intelligence and how to tailor the type of intelligence to that audience.

Taught by

IBM Security Learning Services

Reviews

4.7 rating at Coursera based on 16 ratings

Start your review of Introduction to the Threat Intelligence Lifecycle

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.