All current Threat Intelligence Courses courses in 2024
73 Courses
Introduction to Threat Intelligence
Embark on a journey to master the essentials of cybersecurity with our "Introduction to Threat Intelligence" course. As cyber threats continue to evolve, the demand for skilled threat intelligence analysts is skyrocketing globally. This course, specially designed for aspiring threat intelligence professionals, serves as your gateway to understandin.
Pluralsight
Free Trial Available
1-2 hours
On-Demand
Cyber Security Threat Intelligence Researcher Preview
Join our comprehensive Cyber Security Threat Intelligence Researcher Preview course, designed to equip you with the expertise to identify, analyze, and neutralize cyber threats effectively. Offered by Udemy and tailored for aspiring cybersecurity professionals, this course falls under the categories of Data Analysis Courses and Threat Intelligence.
Udemy
Free Online Course
1 hour 42 minutes
On-Demand
Open Source Intelligence (OSINT) Fundamentals
If you've been exposed to cybersecurity, especially in the realm of Social Engineering, you're likely familiar with OSINT, or Open Source Intelligence. This OSINT course is meticulously designed to offer a foundational grasp of OSINT by covering:
The essence of OSINT
The primary users of OSINT
The ethical and moral considerations in utilizing O.
Cybrary
Paid Course
2-3 hours
On-Demand
Managing Threat Intelligence with Cortex XSOAR
Course Overview: Enroll in our self-paced lab offered exclusively on the Google Cloud console, titled Managing Threat Intelligence with Cortex XSOAR. This course is designed for individuals keen on mastering threat intelligence data management and automating response actions. Engage in a real-life threat hunting scenario to understand the intricaci.
Coursera
Paid Course
1 hour
On-Demand
Intro to Cyber Threat Intelligence
Title: Intro to Cyber Threat Intelligence
Description: Dive into the world of cyber threat intelligence with this comprehensive course offered by Cybrary. Designed for individuals looking to enhance their understanding of digital threats, this course covers essential concepts in threat intelligence and incident response. Whether you're new to the f.
Cybrary
Paid Course
4-5 hours
On-Demand
Learning Threat Modeling for Security Professionals
Enhance your security skills with our "Learning Threat Modeling for Security Professionals" course, provided by LinkedIn Learning. Dive deep into the essential practice of threat modeling, a pivotal process that empowers security experts to identify potential threats and devise effective countermeasures. This course focuses on mastering the four-qu.
LinkedIn Learning
Free Trial Available
On-Demand
Threat Hunting with Windows Event Forwarding
Discover the power of Windows Event Forwarder in our upcoming course titled "Threat Hunting with Windows Event Forwarding," offered by Cybrary. This course tackles the underutilized, yet powerful, built-in tool of Windows Event Forwarding (WEF). Learn how to aggregate event logs from multiple Windows computers to Windows Event Collector (WEC) serve.
Cybrary
Paid Course
1-2 hours
On-Demand
Threat Modeling: Denial of Service and Elevation of Privilege
Event Title: Threat Modeling: Denial of Service and Elevation of Privilege
Description: Dive deep into the complexities of cybersecurity with the final chapter of our Threat Modeling series, provided by LinkedIn Learning. This session focuses specifically on the STRIDE framework, with an emphasis on understanding denial-of-service and elevation-of-.
LinkedIn Learning
Free Trial Available
On-Demand
Threat Modeling: Tampering in Depth
Title: Threat Modeling: Tampering in Depth
Description: Delve into the world of cybersecurity with our focused session on tampering threats, led by industry experts from LinkedIn Learning. This comprehensive workshop will cover the nuances of how attackers manipulate systems and tools ranging from debuggers to advanced cloud services. Understand th.
LinkedIn Learning
Free Trial Available
On-Demand
Threat Modeling: Spoofing In Depth
Title: Threat Modeling: Spoofing In Depth
Description: Delve into the crucial topic of spoofing, a prevalent threat targeting modern systems. This course, provided by LinkedIn Learning, thoroughly examines the types of authentication attacks affecting individuals, machines, file systems, and processes. Understand the mechanics behind these attacks.
LinkedIn Learning
Free Trial Available
On-Demand