starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Curriculum
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Courses
  2. >
  3. Advanced Strategic Threat Intelligence Research & Reporting

Advanced Strategic Threat Intelligence Research & Reporting

Gain advanced threat intelligence skills—collect, analyze, and report cyber threats using tools like Shodan, VirusTotal, and Maltego. Turn data into actionable insights to defend organizations from evolving digital attacks.

Monica McIntire
Monica McIntire
Cybersecurity | intermediate | 9 hours |   Published: Oct 2025

    Discussions

Overview

STUDENTS*
RECOMMEND*

This course includes:

  • On-demand videos
  • Practice assessments
  • Multiple hands-on learning activities
  • Exposure to a real-world project
  • 100% self-paced learning opportunities
  • Certification of completion

Want to Build a Career as an Intelligence Analyst? 

In today’s hyperconnected world, cyber threats are everywhere, identity theft, ransomware, business email compromise, and even weaponised misinformation. False narratives spreading across social media can lead to real-world consequences, disrupting businesses and influencing behavior. 

This course invites you to make a career out of spotting red flags, uncovering patterns, and protecting yourself and your business against these very dangerous threats.  You will explore the art and science of threat intelligence, from data mining and attribution to strategic analysis, all aimed at preventing damage that could save your company millions of dollars. 

Designed for intermediate-level learners, this course will help build your foundation in intelligence collection and analysis. You will explore the threat actor landscape, threat modeling, advanced persistent threat campaigns, and the malware they use. 

You will immerse yourself in the threat landscape, understanding the tactics, techniques and procedures of the adversaries (MITRE attack framework) and learn how to transform the signs and signals into an action-ready plan for defending your business (with NIST 800-53 security controls), and even apply these methods to safeguard your own personally identifiable information as well as that of every member of your company’s staff, clients, vendors and other third parties. 

You’ll learn to distinguish patterns across multiple intelligence sources, OSINT (open source intelligence), HUMINT (human intelligence), and SIGINT (signals intelligence), and gather insights from data found not only on your personal laptop or in your business enterprise, but on the Internet, the deep web, and the dark web. 

You’ll also take a deep dive into report-writing and oral presentations which can bring your career to the next level.  Know your target audience, adapt your language to that audience from the tech savvy network engineers and IT operations teams to the CEO with no technical background.  You’ll communicate efficiently and effectively with great impact, a skill that will translate to any career path you may wish to choose in the future. 

Career opportunities will be endless.  Imagine yourself as an intelligence analyst reporting cybercrime trends and indicators of compromise in your company’s enterprise.  You’ll report to your IT Operations team, your Security team, and even to your CISO and CIO and CEO!  This is an exciting fast-paced career choice that will make you an invaluable member of your staff and open you to amazing opportunities all over the world! 

This course will fundamentally shift how you view information. You will grow from recognizing one SPAM or SCAM email to understanding a trend in the threat landscape throughout your business vertical.  Join us on this journey into the hidden world of cyber threats, and become that cybersecurity hero who saves the day for your company! 

Skills You Will Gain

Advanced Threat Intelligence
Threat Intelligence Training
Cybersecurity Threat Intelligence
Threat Intelligence Analysis

Learning Outcomes (At The End Of This Program, You Will Be Able To...)

  • Differentiate between data, intelligence, threats, and threat impacts, and identify reliable sources for threat data collection. 
  • Apply appropriate intelligence collection methodologies to analyze threat infrastructure and correlate malware and campaign data for enrichment and validation. 
  • Evaluate intelligence across multiple sourcesd conduct risk assessments to identify and prioritize threats to enterprise infrastructure. 
  • Develop strategic intelligence reports tailored to target audiences, and communicate findings clearly to executives, peers, and stakeholders using data storytelling techniques.

Prerequisites

Beginner-level IT or cybersecurity experience with basic networking and security knowledge; A+, Network+, or Security+ certifications recommended but not required.

Who Should Attend

Designed for IT and cybersecurity professionals, CISOs, CEOs, business executives, and analysts seeking advanced skills in threat detection, response, strategy, and risk-based decision-making.

Curriculum

Instructors

*Where courses have been offered multiple times, the “# Students” includes all students who have enrolled. The “%Recommended” shown is also based on this data.
1Chapter 1: Introduction to Threat Intelligence
2Chapter 2: Intelligence Collection and Infrastructure Analysis
3Chapter 3: Data Analysis and Validation
4Chapter 4: Strategic Analysis, Attribution & Threat Modeling 
5Chapter 5: Attribution Frameworks and Challenges
6Chapter 6: Intelligence Confidence and Enterprise Risk Modelling
7Chapter 7: Advanced Collection and Analysis
8Chapter 8: Structured Analysis and Strategic Context
9Chapter 9: Tools and Technology Integration
10Chapter 10: Strategic Intelligence Communication
11Chapter 11: Audience-Focused Communication
12Chapter 12: Professional Intelligence Writing

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 00: Welcome and Course Goals

Segment 01: Threat Actor Types and Attribution

Segment 02: Threat Modeling Frameworks

Segment 03: Legal Ethical and Policy Considerations

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 07: Data Enrichment and Validation

Segment 08: Analytical Methodologies

Segment 09: Attribution and Profiling

Segment 10: Reading - What Are Threat Intelligence Tools?

Segment 11: Hands-On-Learning - Analyzing Malware and Tracking Threat Campaigns with Sandboxes and Intel Repositories

Segment 12: Quiz - Data Analysis and Validation

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 04: Intelligence Collection Methodologies

Segment 05: Threat Infrastructure Analysis

Segment 06: Malware and Campaign Correlation

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 13: Analysis of Competing Hypotheses (ACH)

Segment 14: Red Teaming

Segment 15: Scenario Modelling

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 16: Attribution Frameworks

Segment 17: Attribution Challenges

Segment 18: Attribution Case study examples

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 19: Intelligence Confidence Language

Segment 20: Threat Modelling for Enterprise Risk

Segment 21: Threat Model Design Using NIST 800-30 or STRIDE

Segment 22: Reading - Five Key Steps to Delivering Intelligence Reports that Your Board Actually Reads

Segment 23: Hands-On-Learning - Create a 3-Minute "Threat Update" Presentation

Segment 24: Quiz - Intelligence Confidence and Enterprise Risk Modelling

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 25: Collection Planning _ Source Prioritization

Segment 26: Malware_ Tooling_ and TTP Analysis

Segment 27: Campaign Correlation _ Actor Attribution

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 31: Threat Intelligence Tools _ Enrichment

Segment 32: Graph Analytics DeepDive

Segment 33: Reading - DFIR Report Case Studies

Segment 34: Hands-On-Learning - Use VirusTotal, Any.Run, and Shodan for Malware and Infrastructure Research

Segment 35: Quiz - Tools and Technology Integration

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 36: Threat Intelligence for Decision-Makers

Segment 37: Tools for Strategic Intelligence Analysis

Segment 38: Intelligence Reporting Structures

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 28: Structured Analytic Techniques (SATs)

Segment 29: Threat Modelling for Strategic Context

Segment 30: Attribution with Intelligence Confidence

Monica McIntire

Monica McIntire

Monica McIntire is a highly experienced cybersecurity professional with deep expertise in protecting systems, data, and networks. Over the past 10+ years, she has built and led strong cybersecurity programs across large, complex organizations. Her work focuses on reducing risk, improving security posture, and preparing others to succeed in the ever-changing cybersecurity landscape. She holds the respected CISSP (Certified Information Systems Security Professional) certification. She has hands-on experience with many areas of cybersecurity, including vulnerability management, incident response, risk assessment, and compliance. She has led major efforts to reduce enterprise vulnerabilities—most notably cutting them by 95% while serving as Cybersecurity Manager at Hyland Software. Her technical skills include using tools like Tanium and Tenable to monitor and secure systems. She has also helped develop security architecture for over 150 separate network environments while working at Lockheed Martin, one of the most complex and high-stakes IT environments in the world. She has performed and supported audits across a wide range of standards, including NIST 800-53, SOC, and HITRUST. She has led cross-functional security teams, worked closely with vendors and executives, and trained professionals to understand and implement modern security practices. Monica is known for her ability to take complex cybersecurity topics and make them practical, useful, and easy to understand. She is passionate about helping others grow in this critical field and continues to lead efforts that make organizations stronger and more secure.
VIEW MY CHANNEL

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 42: Intelligence Writing Principles _ Best Practices

Segment 43: Communicating Uncertainty and Confidence

Segment 44: Automation and Collaboration Tools in Reporting 

Segment 45: Reading - Framing Effects in Risk Communication Messages – Hazard Identification vs. Risk Assessment

Segment 46: Hands-On-Learning - Threat Update Presentation

Segment 47: Outro-Course Wrap-up Video

Segment 48: Quiz - Professional Intelligence Writing

Segment 49: Project - Threat Actor Campaign Analysis & Intelligence Brief

You need to enroll in this course to access the curriculum. Click 'Enroll' to get started!

Segment 39: Effective Communication Techniques

Segment 40: Stakeholder-Oriented Reporting

Segment 41: Report Examples