Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Creating REAL Threat Intelligence with Evernote

BruCON Security Conference via YouTube

Overview

This course aims to teach learners how to create real threat intelligence using Evernote. The course covers topics such as understanding threat intelligence, utilizing the GTD methodology, managing data-driven feeds, and integrating open-source intelligence sources. By the end of the course, students will have the skills to build their threat intelligence capabilities using Evernote. The teaching method involves a combination of theoretical concepts, practical examples, and hands-on exercises. This course is intended for cybersecurity professionals, threat analysts, and individuals interested in enhancing their threat intelligence skills using Evernote.

Syllabus

Introduction
Testing
Disclaimer
What is Threat Intelligence
Lessons Learned
Build Before You Buy
The Problem
Specific Requirements
Background
Google Reader
Datadriven feeds
Task management
Secret weapon
GTD methodology
Threat Intel market
The Pyramid of Pain
The Circle
This is your organization
Take it in house
Evernote
Open Source Intel
Sources
Getting Data into Evernote
Recipe Title
Information Sharing
Search
Requirements
Future Ideas
Conclusion
Managing Quality

Taught by

BruCON Security Conference

Reviews

Start your review of Creating REAL Threat Intelligence with Evernote

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.