Threat Intelligence Lifecycle Fundamentals

About this Course

With today's increasing challenges of dealing with more aggressive and persistent threat actors, while also being inundated with information that is full of misinformation and false flags across multiple, unconnected systems, how do you pull from that what information is reliable and actionable?

Created by: IBM

Level: Introductory


Related Online Courses

In this Capstone, you will demonstrate your ability to perform in an Information Technology (IT) Support role by applying your new knowledge to real-world situations. You will practice analyzing... more
Automation requires you to have both, a deep understanding of business logic and the ability to translate it into an automated program using the syntax and semantics of a programming language.... more
An introduction to programming using a language called Python. Learn how to read and write code as well as how to test and "debug" it. Designed for students with or without prior programming... more
Este curso forma parte de una serie de 5 cursos de introducción al uso de sistemas de información en las empresas que te introducirá en el apasionante mundo de las TIC. La serie de cursos está pen... more
Modern software is under constant attack, but many software developers have never been told how to effectively counter those attacks. This course works to solve that problem, by explaining the... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL