What You Need to Know Before
You Start
Starts 9 June 2025 21:27
Ends 9 June 2025
00
days
00
hours
00
minutes
00
seconds
29 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore efficient threat intelligence utilization with TheHive platform, enhancing cybersecurity practices and incident response capabilities.
Syllabus
- Introduction to TheHive
- Understanding Threat Intelligence
- Integrating Threat Intelligence with TheHive
- Incident Response with TheHive
- Advanced Threat Investigation in TheHive
- Best Practices for Threat Intelligence Utilization
- Enhancing Cybersecurity with TheHive
- Review and Wrap-Up
Overview of TheHive platform
Key features and benefits
Installation and setup
Definition and importance of threat intelligence
Types of threat intelligence
Role of threat intelligence in cybersecurity
Configuring external sources
Managing observables and indicators
Automation of intelligence feeds
Workflow and playbook setup
Collaboration and task management
Case and alert management
Querying and analyzing data
Using Cortex for advanced analysis
Linking cases and patterns
Prioritizing intelligence feeds
Continual improvement in threat processing
Case studies and real-world scenarios
Strategic response planning
Measuring and improving response times
Post-incident analysis and reporting
Summary of key learning points
Q&A session
Further resources and continued learning
Subjects
Conference Talks