Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Using Evernote as a Threat Intelligence Management Platform - Part 2

via YouTube

Overview

This course teaches learners how to utilize Evernote as a Threat Intelligence Management Platform. The learning outcomes include understanding the concept of threat intelligence, utilizing open source tools for threat intelligence, automating processes, and effectively sharing and tagging information. The teaching method involves a series of videos from a conference, covering topics such as threat intelligence sharing, case tracking, and future work. This course is intended for individuals interested in threat intelligence, cybersecurity, and information management.

Syllabus

Introduction
Disclaimer
How I Started
Threat Intel Market
Requirements
The Secret Weapon
What is Threat Intelligence
Threat Intel Sharing
Case Tracking
Open Source Tools
OSN Sources
Automating
Sharing
Tagging
Notes
Search
Future Work
Summary
Contact

Reviews

Start your review of Using Evernote as a Threat Intelligence Management Platform - Part 2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.