Udemy - Mastering Basics of Cyber Threat Intelligence

  • Category Other
  • Type Tutorials
  • Language English
  • Total size 2.0 GB
  • Uploaded By freecoursewb
  • Downloads 212
  • Last checked 1 day ago
  • Date uploaded 3 months ago
  • Seeders 12
  • Leechers 1

Infohash : 6129D0C41E81164708502E642A3E3B65A11D3763



Mastering Basics of Cyber Threat Intelligence

https://WebToolTip.com

Published 11/2025
Created by Starweaver Team
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Beginner | Genre: eLearning | Language: English | Duration: 51 Lectures ( 3h 55m ) | Size: 2.1 GB

An introductory guide to the intelligence lifecycle, key sources, and practical applications in modern cybersecurity.

What you'll learn
Explain core principles, types, lifecycle, and role of cyber threat intelligence in defense.
Apply CIA Triad and risk management to turn data into actionable threat insights.
Describe core concepts, functions, and uses of Threat Intelligence Platforms (TIPs).
Use CTI tools to analyze threats, map tactics via MITRE ATT&CK, and plan responses.

Requirements
You need to have a basic understanding of cybersecurity concepts and familiarity with network protocols and security tools.

Files:

[ WebToolTip.com ] Udemy - Mastering Basics of Cyber Threat Intelligence
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 - What is Cyber Threat Intelligence
    • 1 - Intro Video to Course.mp4 (59.1 MB)
    • 2 - Introduction.mp4 (35.3 MB)
    • 3 - What is Cyber Threat Intelligence.mp4 (37.3 MB)
    • 4 - Roles and Responsibilities of CTI.mp4 (51.9 MB)
    • 5 - CTI in Action.mp4 (28.3 MB)
    10 - Using CTI Tools to Analyze Threat Indicators
    • 1 - Introduction.mp4 (36.1 MB)
    • 2 - Introduction to Key CTI Tools.mp4 (53.2 MB)
    • 3 - Aggregating and Enriching Threat Indicators.mp4 (78.8 MB)
    • 4 - Automating Threat Intelligence Workflows.mp4 (39.9 MB)
    11 - Mapping Attacker Tactics with MITRE ATT&CK
    • 1 - MITRE ATT_CK Framework Fundamentals.mp4 (48.2 MB)
    • 2 - Mapping Threat Indicators to ATT_CK TTPs.mp4 (80.1 MB)
    • 3 - Using ATT_CK for Detection and Response.mp4 (87.0 MB)
    12 - Simulated Incident Response from IOC to Action
    • 1 - Simulating a Cyber Incident Scenario Setup.mp4 (38.1 MB)
    • 2 - Identifying IOCs and Profiling Threat Actors.mp4 (80.5 MB)
    • 3 - Recommending and Communicating Response Actions.mp4 (81.8 MB)
    • 4 - Strengthening Cyber Defense with MISP.html (0.6 KB)
    • 5 - HOL Bridging Intelligence and Response - Module 4_Cyber Threat Intelligence Tools and Incident Response (1).pdf (202.3 KB)
    • 5 - HOL Bridging Intelligence and Response.html (0.5 KB)
    • 6 - Project - Full-Spectrum Threat Response & Analysis - Course End Final Project.pdf (204.9 KB)
    • 6 - Project - Full-Spectrum Threat Response & Analysis.html (0.4 KB)
    • 7 - Course Wrap-up Video.mp4 (43.8 MB)
    2 - Types of Threat Intelligence
    • 1 - Tactical Threat Intelligence.mp4 (45.7 MB)
    • 2 - Operational Threat Intelligence.mp4 (45.2 MB)
    • 3 - Strategic Threat Intelligence.mp4 (43.1 MB)
    3 - The Threat Intelligence Lifecycle
    • 1 - Direction_ Discovery_ and Collection.mp4 (45.3 MB)
    • 2 - Processing and Analysis.mp4 (40.9 MB)
    • 3 - Delivering Actionable Intelligence.mp4 (51.2 MB)
    • 4 - An introduction to threat intelligence.html (0.8 KB)
    • 5 - HOL - Simulated Intel Navigating the Threat Intelligence Lifecycle - Module 1_Foundations of Cyber Threat Intelligence (1).pdf (198.7 KB)
    • 5 - HOL - Simulated Intel Navigating the Threat Intelligence Lifecycle.html (0.4 KB)
    4 - CIA Triad - Confidentiality, Integrity, and Availability
    • 1 - Introduction.mp4 (33.4 MB)
    • 2 - Best Practices for Confidentiality.mp4 (45.8 MB)
    • 3 - Principles of Data and Information Integrity.mp4 (41.6 MB)
    • 4 - Continuous Access and Business Resilience.mp4 (52.1 MB)
    5 - Risk Management - Turning Intelligence into Action
    • 1 - Identifying Assets at Risk.mp4 (45.0 MB)
    • 2 - Threat and Vulnerability Assessment.mp4 (49.9 MB)
    • 3 - Selecting and Actioning Control Strategies.mp4 (47.4 MB)
    6 - Applying Security Principles in Practice
    • 1 - Direction_ Discovery_ and Collection.mp4 (47.3 MB)
    • 2 - Processing and Analysis.mp4 (51.7 MB)
    • 3 - Sharing Intelligence to Improve and Adapt.mp4 (54.0 MB)
    • 4 - Data Integrity Detecting and Responding to Ransomware and Other Destructive.html (0.8 KB)
    • 5 - HOL - From Threat to Insight A CIA Triad Analysis Exercise - Module 2_Information Security Principles (1).pdf (197.7 KB)
    • 5 - HOL - From Threat to Insight A CIA Triad Analysis Exercise.html (0.4 KB)
    7 - Introduction to Threat Intelligence Platforms (TIP)
    • 1 - Introduction.mp4 (42.1 MB)
    • 2 - Defining Threat Intelligence Platform (TIP).mp4 (47.4 MB)
    • 3 - Capabilities of a TIP.mp4 (41.1 MB)
    • 4 - TIP vs. Other Cyber Threat Intelligence Tools.mp4 (55.3 MB)
    8 - Integration and Functionality of TIPs
    • 1 - TIP Integration Flow.mp4 (59.3 MB)
    • 2 - Real-Time Monitoring and Feedback Loops.mp4 (44.8 MB)
    • 3 - Why a TIP Is Special.mp4 (39.7 MB)
    9 - Practical Applications and Benefits of TIPs
    • 1 - TIPs in Action.mp4 (43.1 MB)
    • 2 - Enhancing Cyber Defense with TIPs.mp4 (47.0 MB)
    • 3 - The Future of TIPs.mp4 (50.0 MB)
    • 4 - Threat Intelligence Complete Guide to Process and Technology.html (1.0 KB)
    • 5 - HOL - TIPs and Tomorrow Advancing Cyber Defense with Intelligence Platforms - Module 3_Operationalizing CTI - Threat Intelligence Platform (TIP) (1).pdf (204.2 KB)
    • 5 - HOL - TIPs and Tomorrow Advancing Cyber Defense with Intelligence Platforms.html (0.6 KB)
    • Bonus Resources.txt (0.1 KB)

There are currently no comments. Feel free to leave one :)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce
GDRIVE-CACHE 📁 GD (hit) | ID: 1zTpn1mD1b... 📄 torrent 🕐 22 Feb 2026, 05:45:21 am IST ⏰ 19 Mar 2026, 05:45:21 am IST ✅ Valid for 22d 4h 🔄 Refresh Cache