Useful Links
Computer Science
Cybersecurity
Cyber Threat Intelligence
1. Introduction to Cyber Threat Intelligence
2. Threat Intelligence Lifecycle
3. Types of Threat Intelligence
4. Data Sources for Threat Intelligence
5. Analysis Techniques and Frameworks
6. Threat Actors and Attribution
7. Core Components of Threat Intelligence
8. Intelligence Sharing and Platforms
9. Operationalizing Threat Intelligence
10. Building and Maturing a CTI Program
11. Legal and Ethical Considerations
Data Sources for Threat Intelligence
Internal Sources
SIEM Logs
Event Correlation
Alert Generation
Network Security Systems
IDS/IPS Data
Network Traffic Analysis
Endpoint Security Data
EDR Information
Host-Based Monitoring
Incident Response Reports
Post-Incident Analysis
Lessons Learned
Vulnerability Management Data
Scan Results
Patch Management Information
Ticketing and Case Management Systems
Email Security Gateway Data
External Sources
Open-Source Intelligence
Security Blogs and News
Social Media Intelligence
Government Reports
Academic Research
Public Code Repositories
Paste Sites and Forums
Commercial Sources
Threat Intelligence Feeds
Vendor Reports
Private Security Forums
Information Sharing Communities
ISACs
Trust Groups
Human Intelligence
Insider Information
Industry Contacts
Signals Intelligence
Network Traffic Interception
Communication Monitoring
Dark Web and Deep Web Sources
Source Reliability Evaluation
Credibility Assessment
Timeliness and Accuracy Validation
Previous
3. Types of Threat Intelligence
Go to top
Next
5. Analysis Techniques and Frameworks