What You Need to Know Before
You Start
Starts 22 June 2025 12:17
Ends 22 June 2025
00
days
00
hours
00
minutes
00
seconds
1 hour 13 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Free Video
Optional upgrade avallable
Overview
Syllabus
- Introduction to Cyber Threat Intelligence
- Basics of Knowledge Graphs
- Semantic Technologies in Cybersecurity
- Enhancing CTI with Knowledge Graphs
- Building a Cyber Threat Knowledge Graph
- Advanced Threat Detection using Knowledge Graphs
- Analyzing and Querying Knowledge Graphs for CTI
- Challenges and Future Trends
- Practical Demonstrations and Applications
- Conclusion and Next Steps
Overview of Cyber Threat Intelligence (CTI)
Limitations of current CTI standards (e.g., STIX)
Definition and importance of knowledge graphs
Key components: nodes, edges, and properties
Ontologies and vocabularies
Introduction to semantic web technologies
Role of RDF, OWL, and SPARQL
Linking data with ontologies
Integrating knowledge graphs with existing CTI frameworks
Case studies: Beyond STIX standards
Tools and platforms for creating knowledge graphs
Data sources for cyber threat information
Mapping and integration
Pattern recognition and anomaly detection
Real-time threat intelligence updates
Practical use cases and demonstrations
Writing SPARQL queries for threat intelligence analysis
Visualizing query results and analysis
Practical exercises
Scalability and performance considerations
Privacy and security implications
Emerging trends and future directions
Live demonstration of a cyber threat knowledge graph
Case study analysis
Group project work and presentations
Summary of key concepts
Further resources and reading
Course assessments and feedback
Subjects
Computer Science