starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Advanced Strategic Threat Intelligence Research & Reporting

Advanced Strategic Threat Intelligence Research & Reporting

Gain advanced threat intelligence skills—collect, analyze, and report cyber threats using tools like Shodan, VirusTotal, and Maltego. Turn data into actionable insights to defend organizations from evolving digital attacks.

Monica McIntire
Monica McIntire
Cybersecurity | intermediate | 9 hours |   Published: Oct 2025

    Discussions

Overview

STUDENTS*
RECOMMEND*

This course includes:

  • On-demand videos
  • Practice assessments
  • Multiple hands-on learning activities
  • Exposure to a real-world project
  • 100% self-paced learning opportunities
  • Certification of completion

Want to Build a Career as an Intelligence Analyst? 

In today’s hyperconnected world, cyber threats are everywhere, identity theft, ransomware, business email compromise, and even weaponised misinformation. False narratives spreading across social media can lead to real-world consequences, disrupting businesses and influencing behavior. 

This course invites you to make a career out of spotting red flags, uncovering patterns, and protecting yourself and your business against these very dangerous threats.  You will explore the art and science of threat intelligence, from data mining and attribution to strategic analysis, all aimed at preventing damage that could save your company millions of dollars. 

Designed for intermediate-level learners, this course will help build your foundation in intelligence collection and analysis. You will explore the threat actor landscape, threat modeling, advanced persistent threat campaigns, and the malware they use. 

You will immerse yourself in the threat landscape, understanding the tactics, techniques and procedures of the adversaries (MITRE attack framework) and learn how to transform the signs and signals into an action-ready plan for defending your business (with NIST 800-53 security controls), and even apply these methods to safeguard your own personally identifiable information as well as that of every member of your company’s staff, clients, vendors and other third parties. 

You’ll learn to distinguish patterns across multiple intelligence sources, OSINT (open source intelligence), HUMINT (human intelligence), and SIGINT (signals intelligence), and gather insights from data found not only on your personal laptop or in your business enterprise, but on the Internet, the deep web, and the dark web. 

You’ll also take a deep dive into report-writing and oral presentations which can bring your career to the next level.  Know your target audience, adapt your language to that audience from the tech savvy network engineers and IT operations teams to the CEO with no technical background.  You’ll communicate efficiently and effectively with great impact, a skill that will translate to any career path you may wish to choose in the future. 

Career opportunities will be endless.  Imagine yourself as an intelligence analyst reporting cybercrime trends and indicators of compromise in your company’s enterprise.  You’ll report to your IT Operations team, your Security team, and even to your CISO and CIO and CEO!  This is an exciting fast-paced career choice that will make you an invaluable member of your staff and open you to amazing opportunities all over the world! 

This course will fundamentally shift how you view information. You will grow from recognizing one SPAM or SCAM email to understanding a trend in the threat landscape throughout your business vertical.  Join us on this journey into the hidden world of cyber threats, and become that cybersecurity hero who saves the day for your company! 

Skills You Will Gain

Advanced Threat Intelligence
Threat Intelligence Training
Cybersecurity Threat Intelligence
Threat Intelligence Analysis

Learning Outcomes (At The End Of This Program, You Will Be Able To...)

  • Differentiate between data, intelligence, threats, and threat impacts, and identify reliable sources for threat data collection. 
  • Apply appropriate intelligence collection methodologies to analyze threat infrastructure and correlate malware and campaign data for enrichment and validation. 
  • Evaluate intelligence across multiple sourcesd conduct risk assessments to identify and prioritize threats to enterprise infrastructure. 
  • Develop strategic intelligence reports tailored to target audiences, and communicate findings clearly to executives, peers, and stakeholders using data storytelling techniques.

Prerequisites

Beginner-level IT or cybersecurity experience with basic networking and security knowledge; A+, Network+, or Security+ certifications recommended but not required.

Who Should Attend

Designed for IT and cybersecurity professionals, CISOs, CEOs, business executives, and analysts seeking advanced skills in threat detection, response, strategy, and risk-based decision-making.

Curriculum

Instructors

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
Monica McIntire

Monica McIntire

Monica McIntire is a highly experienced cybersecurity professional with deep expertise in protecting systems, data, and networks. Over the past 10+ years, she has built and led strong cybersecurity programs across large, complex organizations. Her work focuses on reducing risk, improving security posture, and preparing others to succeed in the ever-changing cybersecurity landscape. She holds the respected CISSP (Certified Information Systems Security Professional) certification. She has hands-on experience with many areas of cybersecurity, including vulnerability management, incident response, risk assessment, and compliance. She has led major efforts to reduce enterprise vulnerabilities—most notably cutting them by 95% while serving as Cybersecurity Manager at Hyland Software. Her technical skills include using tools like Tanium and Tenable to monitor and secure systems. She has also helped develop security architecture for over 150 separate network environments while working at Lockheed Martin, one of the most complex and high-stakes IT environments in the world. She has performed and supported audits across a wide range of standards, including NIST 800-53, SOC, and HITRUST. She has led cross-functional security teams, worked closely with vendors and executives, and trained professionals to understand and implement modern security practices. Monica is known for her ability to take complex cybersecurity topics and make them practical, useful, and easy to understand. She is passionate about helping others grow in this critical field and continues to lead efforts that make organizations stronger and more secure.
VIEW MY CHANNEL
1Chapter 1: Introduction to Threat Intelligence
2Chapter 2: Intelligence Collection and Infrastructure Analysis
3Chapter 3: Data Analysis and Validation
4Chapter 4: Strategic Analysis, Attribution & Threat Modeling 
5Chapter 5: Attribution Frameworks and Challenges
6Chapter 6: Intelligence Confidence and Enterprise Risk Modelling
7Chapter 7: Advanced Collection and Analysis
8Chapter 8: Structured Analysis and Strategic Context
9Chapter 9: Tools and Technology Integration
10Chapter 10: Strategic Intelligence Communication
11Chapter 11: Audience-Focused Communication
12Chapter 12: Professional Intelligence Writing

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

M4L2V1_Effective Communication Techniques

M4L2V2- Stakeholder-Oriented Reporting

M4L2V3 - Report Examples

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

M3L1V1-Collection Planning _ Source Prioritization

M3L1V2- Malware_ Tooling_ and TTP Analysis

M3L1V3-Campaign Correlation _ Actor Attribution

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Reading - DFIR Report Case Studies

Hands-On-Learning - Use VirusTotal, Any.Run, and Shodan for Malware and Infrastructure Research

M3L3V1-Threat Intelligence Tools _ Enrichment

M3L3V2_Graph Analytics DeepDive

Quiz - Tools and Technology Integration

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

M1L2V1- Intelligence Collection Methodologies

M1L2V2- Threat Infrastructure Analysis

M1L2V3 _Malware and Campaign Correlation

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

M2L1V1-Analysis of Competing Hypotheses (ACH)

M2L1V2 - Red Teaming

M2L1V3 - Scenario Modelling

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Intro -Welcome and Course Goals

M1L1V1-Threat Actor Types and Attribution

M1L1V2-Threat Modeling Frameworks

M1L1V3-Legal_ Ethical_ and Policy Considerations

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Reading - Five Key Steps to Delivering Intelligence Reports that Your Board Actually Reads

Hands-On-Learning - Create a 3-Minute "Threat Update" Presentation

Quiz - Intelligence Confidence and Enterprise Risk Modelling

M2L3V1 Intelligence Confidence Language

M2L3V2 Threat Modelling for Enterprise Risk

M2L3V3 -Threat Model Design Using NIST 800-30 or STRIDE

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

M4L1V1-Threat Intelligence for Decision-Makers

M4L1V2- Tools for Strategic Intelligence Analysis

M4L1V3- Intelligence Reporting Structures -

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Reading - Framing Effects in Risk Communication Messages – Hazard Identification vs. Risk Assessment

Hands-On-Learning - Threat Update Presentation

Quiz - Professional Intelligence Writing

M4L3V1 Intelligence Writing Principles _ Best Practices

M4L3V2_Communicating Uncertainty and Confidence

M4L3V3-Automation and Collaboration Tools in Reporting 

Outro-Course Wrap-up Video

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

M3L2V1_Structured Analytic Techniques (SATs)

M3L2V2_Threat Modelling for Strategic Context

M3L2V3_Attribution with Intelligence Confidence

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Reading - What Are Threat Intelligence Tools?

Hands-On-Learning - Analyzing Malware and Tracking Threat Campaigns with Sandboxes and Intel Repositories

Quiz - Data Analysis and Validation

M1L3V1_Data Enrichment and Validation

M1L3V1- Demo- Intelligence Collection and Malware and Campaign Correlation

M1L3V2_Analytical Methodologies

M1L3V3 - Attribution and Profiling

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

M2L2V1-Attribution Frameworks

M2L2V2-Attribution Challenges

M2L2V3-Attribution Case study examples