What You Need to Know Before
You Start
Starts 16 June 2025 11:11
Ends 16 June 2025
00
days
00
hours
00
minutes
00
seconds
55 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Learn to build a data science capability into your threat hunting team, enhancing intelligence gathering and analysis for improved cybersecurity operations and threat detection.
Syllabus
- Introduction to Contextual Threat Intelligence
- Fundamentals of Data Science in Threat Intelligence
- Building a Data Science Capability
- Data Collection and Management
- Data Analysis Techniques for Threat Detection
- Enhancing Threat Intelligence with Machine Learning
- Contextualizing Threat Intelligence
- Visualization and Reporting
- Operationalizing Data Science in Threat Hunting
- Conclusion and Next Steps
- Final Project
Definition and significance in cybersecurity
Overview of threat hunting and its role in modern security operations
Basics of data science relevant to cybersecurity
Key concepts: machine learning, statistical analysis, data preprocessing
Integrating data science into hunting workflows
Tools and technologies for data-driven threat intelligence
Team roles and required skills
Sources of threat intelligence data
Data handling, storage, and preprocessing techniques
Ensuring data quality and relevance
Overview of analytical methods and algorithms
Use of statistical models and machine learning in detecting threats
Real-time data analysis for proactive threat hunting
Introduction to machine learning models for threat analysis
Training, validation, and deployment of models
Case studies of machine learning applications in threat intelligence
Adding context to data: geopolitical, temporal, and situational factors
Building and using threat intelligence frameworks
Tools and techniques for visualizing security data
Effective communication of findings to stakeholders
Creating actionable reports from data insights
Building pipelines and automating processes
Continuous improvement of threat detection capabilities
Best practices and common challenges
Review of key concepts
Roadmap for implementing data science capabilities
Further learning resources and certifications
Apply learned concepts to build a data science-driven threat intelligence strategy.
Subjects
Conference Talks