Overview
This course teaches learners how to utilize Evernote as a Threat Intelligence Management Platform. The learning outcomes include understanding the concept of threat intelligence, utilizing open source tools for threat intelligence, automating processes, and effectively sharing and tagging information. The teaching method involves a series of videos from a conference, covering topics such as threat intelligence sharing, case tracking, and future work. This course is intended for individuals interested in threat intelligence, cybersecurity, and information management.
Syllabus
Introduction
Disclaimer
How I Started
Threat Intel Market
Requirements
The Secret Weapon
What is Threat Intelligence
Threat Intel Sharing
Case Tracking
Open Source Tools
OSN Sources
Automating
Sharing
Tagging
Notes
Search
Future Work
Summary
Contact