From the course: Advanced Cyber Threat Intelligence

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Summary

Summary

- [Alyssa] We arrived to the end of the Advanced Cyber Threat Intelligence course. This is the last video and the last module of this course. In this video, we are going to talk about the most important parts of each module. In the introduction to this course, we introduced the intelligence lifecycle and we explained how the course is built based on each phase of this cycle. Our first module was dedicated to the data collection sources, and here we discussed the two big categories of data collection sources which are the internal sources and the external sources. For the internal sources, we defined three categories which are endpoint resources, network sources, and finished reports, or reports from previous investigations. And when it comes to external data sources, we discussed three types which are private data sources including feeds, threat intelligence platforms, and finished reports, community sources, which…

Contents