Learn to collect, process, and analyze information about current and potential cyber threats. This enables organizations to be proactive, using frameworks like MITRE ATT&CK to build stronger defenses based on real-world threat actor behaviors.
Understand the CTI lifecycle (Planning, Collection, etc.).
Utilize OSINT techniques for threat data collection.
Analyze IOCs (Indicators of Compromise) and threat reports.
Map threats to frameworks like MITRE ATT&CK for defense.
Check our
other products
Be sure that you get all of them

Azure/AWS Solutions Architect Associate
Go beyond the basics and learn to design scalable, highly available, and secure cloud infrastructure on either Microsoft Azure or Amazon Web Services. This is a […]

Enterprise Linux System Administrator (LPI/RHCSA Prep)
Practical mastery of command-line administration, including file system management, network service configuration (DNS, Web), user permissions, and security hardening on enterprise-grade Linux servers. Manage local storage […]


Reviews
There are no reviews yet.