Threat Intelligence Principles
Threat Intelligence Definition
The Importance of Threat Intelligence
Types of Threat Intelligence
Intelligence Meets Security
Introduction - Knowledge Check
Threat Intelligence Cycle
Dissemination and Feedback
Threat Intelligence Cycle - Knowledge Check
Start Your Investigation - Knowledge Check
Google Hacking
The Most Common Operators
Google Operators - Knowledge Check
Common Devices and Hardware
Google Hacking - Knowledge Check
Ready, Set, Lab! - Searching Shodan
Week 21 - Searching Shodan
2Questions
Online Anonymity
Secure Browsing - Knowledge Check
Jeffrey's Image Metadata Viewer
How Does the Tor Network Work?
The Difference Between Tor and a VPN
Dark Market Characteristics
Ready, Set, Lab! - Tor Installation
Week 21 - Tor Installation
2Questions
Trend Analysis
Introduction to Trend Analysis
Trends in Cyber Threat Intelligence
Basic Analytics - Knowledge Check
Basic Excel Data Analysis - Knowledge Check
Google's Web Scraper - Tool Introduction
Web Scraping Exercise Introduction
Web Scraping Exercise - Part 1
Web Scraping Exercise - Part 2
Web Scraping - Knowledge Check
Kibana - Tool Introduction
Ready, Set, Lab! - Elastic Investigation
Week 21 - Elastic Investigation
2Questions
Monitoring & Alerting
Module Closure
Threat Intelligence Glossary
Threat Intelligence Ongoing Learning
Your Career Guide to Success
Celebrating Your Accomplishments