All current Threat Intelligence Courses courses in 2024
75 Courses
Threat Intelligence: Cyber Threats and Kill Chain Methodology
Gain invaluable insights into the landscape of cyber threats and enhance your threat intelligence capabilities with our comprehensive course on "Cyber Threats and Kill Chain Methodology." This meticulous program is designed to equip you as a cyber threat intelligence analyst with a profound understanding of the primary cyber threats and attacker me.
Pluralsight
Free Trial Available
2 hours 27 minutes
On-Demand
Configuring Threat Intelligence in Splunk Enterprise Security
Discover how to leverage threat intelligence to enhance SOC operations with the "Configuring Threat Intelligence in Splunk Enterprise Security" course, offered through Pluralsight. This premium course is specifically tailored for Splunk Enterprise Security, a top-tier application within the Splunk ecosystem designed to streamline SOC activities. Th.
Pluralsight
Free Trial Available
1 hour 44 minutes
On-Demand
Introduction to Threat Intelligence
Embark on a journey to master the essentials of cybersecurity with our "Introduction to Threat Intelligence" course. As cyber threats continue to evolve, the demand for skilled threat intelligence analysts is skyrocketing globally. This course, specially designed for aspiring threat intelligence professionals, serves as your gateway to understandin.
Pluralsight
Free Trial Available
1-2 hours
On-Demand
Cyber Security Threat Intelligence Researcher Preview
Join our comprehensive Cyber Security Threat Intelligence Researcher Preview course, designed to equip you with the expertise to identify, analyze, and neutralize cyber threats effectively. Offered by Udemy and tailored for aspiring cybersecurity professionals, this course falls under the categories of Data Analysis Courses and Threat Intelligence.
Udemy
Free Online Course
1 hour 42 minutes
On-Demand
Open Source Intelligence (OSINT) Fundamentals
If you've been exposed to cybersecurity, especially in the realm of Social Engineering, you're likely familiar with OSINT, or Open Source Intelligence. This OSINT course is meticulously designed to offer a foundational grasp of OSINT by covering:
The essence of OSINT
The primary users of OSINT
The ethical and moral considerations in utilizing O.
Cybrary
Paid Course
2-3 hours
On-Demand
Managing Threat Intelligence with Cortex XSOAR
Course Overview: Enroll in our self-paced lab offered exclusively on the Google Cloud console, titled Managing Threat Intelligence with Cortex XSOAR. This course is designed for individuals keen on mastering threat intelligence data management and automating response actions. Engage in a real-life threat hunting scenario to understand the intricaci.
Coursera
Paid Course
1 hour
On-Demand
Intro to Cyber Threat Intelligence
Title: Intro to Cyber Threat Intelligence
Description: Dive into the world of cyber threat intelligence with this comprehensive course offered by Cybrary. Designed for individuals looking to enhance their understanding of digital threats, this course covers essential concepts in threat intelligence and incident response. Whether you're new to the f.
Cybrary
Paid Course
4-5 hours
On-Demand
Threat Modeling: Repudiation in Depth
```
Title: Threat Modeling: Repudiation in Depth
Description: Dive deep into the world of repudiation threats and uncover effective strategies to safeguard against them. Through this comprehensive guide offered by LinkedIn Learning, participants will gain invaluable insights on tackling fraud, identity theft, and repudiation within various technolo.
LinkedIn Learning
Free Trial Available
On-Demand
Cybersecurity Threat Hunting for SOC Analysts
Title: Cybersecurity Threat Hunting for SOC Analysts
Description: Acquire cutting-edge blue team skills necessary for uncovering hidden threats within enterprise networks through our specialized Udemy course.
University: N/A
Provider: Udemy
Categories: Cybersecurity Courses, Threat Intelligence Courses, Linux Courses
Udemy
Paid Course
8 hours 28 minutes
On-Demand
Threat Hunting with Windows Event Forwarding
Discover the power of Windows Event Forwarder in our upcoming course titled "Threat Hunting with Windows Event Forwarding," offered by Cybrary. This course tackles the underutilized, yet powerful, built-in tool of Windows Event Forwarding (WEF). Learn how to aggregate event logs from multiple Windows computers to Windows Event Collector (WEC) serve.
Cybrary
Paid Course
1-2 hours
On-Demand