What You Need to Know Before
You Start

Starts 6 July 2025 12:37

Ends 6 July 2025

00 Days
00 Hours
00 Minutes
00 Seconds
course image

Judo Threat Intelligence - Frank Angiolelli

Join the insightful session led by Frank Angiolelli on YouTube, where you'll explore the core principles of threat intelligence. Understand what exploit kits are and how to build custom alerts to bolster your cybersecurity measures. Additionally, delve into practical tactical actions and see how artificial intelligence can enhance cyb.
via YouTube

2825 Courses


42 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Join the insightful session led by Frank Angiolelli on YouTube, where you'll explore the core principles of threat intelligence. Understand what exploit kits are and how to build custom alerts to bolster your cybersecurity measures.

Additionally, delve into practical tactical actions and see how artificial intelligence can enhance cybersecurity defenses. Perfect for anyone interested in AI applications in cybersecurity and conference talks.

Syllabus

  • Introduction to Threat Intelligence
  • Overview of Threat Intelligence
    Importance and Benefits in Cybersecurity
    Key Concepts and Terminology
  • Threat Intelligence Principles
  • Types of Threat Intelligence (Strategic, Tactical, Operational, Technical)
    Intelligence Lifecycle
    Data Sources and Collection Methods
  • Exploit Kits
  • Definition and Purpose of Exploit Kits
    Common Types and Examples
    Detection and Mitigation Strategies
  • Custom Alert Building
  • Fundamentals of Building Effective Alerts
    Tools and Platforms for Alert Creation
    Analyzing and Refining Alerts
  • Tactical Actions in Cybersecurity
  • Incident Response Procedures
    Building an Effective Defense Strategy
    Case Studies of Tactical Threat Management
  • AI Applications in Cybersecurity
  • Overview of AI Technologies in Security
    Machine Learning for Threat Detection
    AI-driven Automation in Cyber Defense
  • Practical Workshops
  • Hands-On Lab: Creating and Refining Alerts
    Simulation: Responding to Cyber Threats
    Use Case Analysis: Successful AI Implementations
  • Course Conclusion
  • Review of Key Learnings
    Future Trends in Threat Intelligence
    Resources for Continued Learning

Subjects

Conference Talks