Useful Links
Computer Science
Cybersecurity
Cyber Threat Intelligence
1. Introduction to Cyber Threat Intelligence
2. Threat Intelligence Lifecycle
3. Types of Threat Intelligence
4. Data Sources for Threat Intelligence
5. Analysis Techniques and Frameworks
6. Threat Actors and Attribution
7. Core Components of Threat Intelligence
8. Intelligence Sharing and Platforms
9. Operationalizing Threat Intelligence
10. Building and Maturing a CTI Program
11. Legal and Ethical Considerations
Types of Threat Intelligence
Strategic Intelligence
Threat Landscape Overview
Global Trends
Industry-Specific Threats
Risk, Motives, and Trends Analysis
Threat Actor Motivations
Emerging Technology Risks
Executive Audience Focus
Executive Reporting Formats
Decision Support Materials
Tactical Intelligence
Adversary TTPs Details
Common Attack Vectors
Defensive Recommendations
Immediate Threat Focus
Real-Time Alerts
Playbooks and Runbooks
Security Management Audience
Operational Briefings
Security Architecture Guidance
Operational Intelligence
Specific Attack Information
Threat Actor Campaigns
Attack Timelines
Campaign and Intent Focus
Attribution Analysis
Campaign Tracking
Incident Response Audience
Investigation Support
Threat Hunting Guidance
Technical Intelligence
Indicators of Compromise
IP Addresses
File Hashes
URLs
Domain Names
Malware and Infrastructure Focus
Malware Analysis
Signature Development
SOC Analyst Audience
Detection System Integration
Automated Blocking
Previous
2. Threat Intelligence Lifecycle
Go to top
Next
4. Data Sources for Threat Intelligence