Course Content
Module 1: Introduction to SOC
Introduction to SOC
0/2
Module 2: Basics of Cybersecurity
Basics of Cybersecurity
0/2
Module 4: Threat Intelligence and Incident Response
Threat Intelligence and Incident Response
0/2
Module 5: Monitoring and Analysis
Monitoring and Analysis
0/2
Module 6: Practical SOC Operations
Practical SOC Operations
0/2
Module 7: Advanced SOC Techniques
Advanced SOC Techniques
0/2
Module 8: Continuous Improvement and Learning
Continuous Improvement and Learning
0/2
Security Operation Center (SOC) Level 1
About Lesson

4.1 Threat Intelligence

Content:

  • What is threat intelligence?
  • Sources of threat intelligence (open-source, commercial, internal)
  • Using threat intelligence to improve SOC effectiveness

Details: Threat intelligence involves collecting and analyzing information about current and potential attacks that threaten the safety of an organization. Sources can include open-source intelligence (OSINT), commercial providers, and internal data.