Advanced Strategic Threat Intelligence Research & Reporting
Gain advanced threat intelligence skills—collect, analyze, and report cyber threats using tools like Shodan, VirusTotal, and Maltego. Turn data into actionable insights to defend organizations from evolving digital attacks.
Overview
This course includes:
- On-demand videos
- Practice assessments
- Multiple hands-on learning activities
- Exposure to a real-world project
- 100% self-paced learning opportunities
- Certification of completion
Want to Build a Career as an Intelligence Analyst?
In today’s hyperconnected world, cyber threats are everywhere, identity theft, ransomware, business email compromise, and even weaponised misinformation. False narratives spreading across social media can lead to real-world consequences, disrupting businesses and influencing behavior.
This course invites you to make a career out of spotting red flags, uncovering patterns, and protecting yourself and your business against these very dangerous threats. You will explore the art and science of threat intelligence, from data mining and attribution to strategic analysis, all aimed at preventing damage that could save your company millions of dollars.
Designed for intermediate-level learners, this course will help build your foundation in intelligence collection and analysis. You will explore the threat actor landscape, threat modeling, advanced persistent threat campaigns, and the malware they use.
You will immerse yourself in the threat landscape, understanding the tactics, techniques and procedures of the adversaries (MITRE attack framework) and learn how to transform the signs and signals into an action-ready plan for defending your business (with NIST 800-53 security controls), and even apply these methods to safeguard your own personally identifiable information as well as that of every member of your company’s staff, clients, vendors and other third parties.
You’ll learn to distinguish patterns across multiple intelligence sources, OSINT (open source intelligence), HUMINT (human intelligence), and SIGINT (signals intelligence), and gather insights from data found not only on your personal laptop or in your business enterprise, but on the Internet, the deep web, and the dark web.
You’ll also take a deep dive into report-writing and oral presentations which can bring your career to the next level. Know your target audience, adapt your language to that audience from the tech savvy network engineers and IT operations teams to the CEO with no technical background. You’ll communicate efficiently and effectively with great impact, a skill that will translate to any career path you may wish to choose in the future.
Career opportunities will be endless. Imagine yourself as an intelligence analyst reporting cybercrime trends and indicators of compromise in your company’s enterprise. You’ll report to your IT Operations team, your Security team, and even to your CISO and CIO and CEO! This is an exciting fast-paced career choice that will make you an invaluable member of your staff and open you to amazing opportunities all over the world!
This course will fundamentally shift how you view information. You will grow from recognizing one SPAM or SCAM email to understanding a trend in the threat landscape throughout your business vertical. Join us on this journey into the hidden world of cyber threats, and become that cybersecurity hero who saves the day for your company!
Skills You Will Gain
Learning Outcomes (At The End Of This Program, You Will Be Able To...)
- Differentiate between data, intelligence, threats, and threat impacts, and identify reliable sources for threat data collection.
- Apply appropriate intelligence collection methodologies to analyze threat infrastructure and correlate malware and campaign data for enrichment and validation.
- Evaluate intelligence across multiple sourcesd conduct risk assessments to identify and prioritize threats to enterprise infrastructure.
- Develop strategic intelligence reports tailored to target audiences, and communicate findings clearly to executives, peers, and stakeholders using data storytelling techniques.
Prerequisites
Beginner-level IT or cybersecurity experience with basic networking and security knowledge; A+, Network+, or Security+ certifications recommended but not required.
Who Should Attend
Designed for IT and cybersecurity professionals, CISOs, CEOs, business executives, and analysts seeking advanced skills in threat detection, response, strategy, and risk-based decision-making.