Overview
This course aims to teach learners how to create real threat intelligence using Evernote. The course covers topics such as understanding threat intelligence, utilizing the GTD methodology, managing data-driven feeds, and integrating open-source intelligence sources. By the end of the course, students will have the skills to build their threat intelligence capabilities using Evernote. The teaching method involves a combination of theoretical concepts, practical examples, and hands-on exercises. This course is intended for cybersecurity professionals, threat analysts, and individuals interested in enhancing their threat intelligence skills using Evernote.
Syllabus
Introduction
Testing
Disclaimer
What is Threat Intelligence
Lessons Learned
Build Before You Buy
The Problem
Specific Requirements
Background
Google Reader
Datadriven feeds
Task management
Secret weapon
GTD methodology
Threat Intel market
The Pyramid of Pain
The Circle
This is your organization
Take it in house
Evernote
Open Source Intel
Sources
Getting Data into Evernote
Recipe Title
Information Sharing
Search
Requirements
Future Ideas
Conclusion
Managing Quality
Taught by
BruCON Security Conference