Useful Links
1. Introduction to Cyber Threat Intelligence
2. Threat Intelligence Lifecycle
3. Types of Threat Intelligence
4. Data Sources for Threat Intelligence
5. Analysis Techniques and Frameworks
6. Threat Actors and Attribution
7. Core Components of Threat Intelligence
8. Intelligence Sharing and Platforms
9. Operationalizing Threat Intelligence
10. Building and Maturing a CTI Program
11. Legal and Ethical Considerations
  1. Computer Science
  2. Cybersecurity

Cyber Threat Intelligence

1. Introduction to Cyber Threat Intelligence
2. Threat Intelligence Lifecycle
3. Types of Threat Intelligence
4. Data Sources for Threat Intelligence
5. Analysis Techniques and Frameworks
6. Threat Actors and Attribution
7. Core Components of Threat Intelligence
8. Intelligence Sharing and Platforms
9. Operationalizing Threat Intelligence
10. Building and Maturing a CTI Program
11. Legal and Ethical Considerations
  1. Core Components of Threat Intelligence
    1. Indicators of Compromise
      1. Definition and Lifecycle
        1. Creation and Discovery
          1. Validation and Sharing
            1. Expiration and Retirement
            2. IoC Types
              1. IP Addresses
                1. Domain Names
                  1. File Hashes
                    1. URLs
                      1. Email Artifacts
                        1. Registry Keys
                          1. File Paths
                            1. SSL Certificates
                            2. IoC Management
                              1. Storage and Retrieval
                                1. Automation in Handling
                              2. Indicators of Attack
                                1. Behavioral Focus
                                  1. IoA Examples
                                    1. Unusual Lateral Movement
                                      1. Privilege Escalation Attempts
                                        1. Suspicious Process Creation
                                        2. IoA vs. IoC Distinctions
                                        3. Tactics, Techniques, and Procedures
                                          1. TTP Definitions
                                            1. Threat Actor TTP Mapping
                                              1. Proactive Defense Applications
                                                1. TTP Evolution and Tracking
                                                2. Threat Intelligence Contextualization
                                                  1. Organizational Relevance
                                                    1. Threat Scoring and Prioritization

                                                  Previous

                                                  6. Threat Actors and Attribution

                                                  Go to top

                                                  Next

                                                  8. Intelligence Sharing and Platforms

                                                  © 2025 Useful Links. All rights reserved.

                                                  About•Bluesky•X.com