Useful Links
Computer Science
Cybersecurity
Cyber Threat Intelligence
1. Introduction to Cyber Threat Intelligence
2. Threat Intelligence Lifecycle
3. Types of Threat Intelligence
4. Data Sources for Threat Intelligence
5. Analysis Techniques and Frameworks
6. Threat Actors and Attribution
7. Core Components of Threat Intelligence
8. Intelligence Sharing and Platforms
9. Operationalizing Threat Intelligence
10. Building and Maturing a CTI Program
11. Legal and Ethical Considerations
Core Components of Threat Intelligence
Indicators of Compromise
Definition and Lifecycle
Creation and Discovery
Validation and Sharing
Expiration and Retirement
IoC Types
IP Addresses
Domain Names
File Hashes
URLs
Email Artifacts
Registry Keys
File Paths
SSL Certificates
IoC Management
Storage and Retrieval
Automation in Handling
Indicators of Attack
Behavioral Focus
IoA Examples
Unusual Lateral Movement
Privilege Escalation Attempts
Suspicious Process Creation
IoA vs. IoC Distinctions
Tactics, Techniques, and Procedures
TTP Definitions
Threat Actor TTP Mapping
Proactive Defense Applications
TTP Evolution and Tracking
Threat Intelligence Contextualization
Organizational Relevance
Threat Scoring and Prioritization
Previous
6. Threat Actors and Attribution
Go to top
Next
8. Intelligence Sharing and Platforms