Udemy - Mastering Basics of Cyber Threat Intelligence
- Category Other
- Type Tutorials
- Language English
- Total size 2.0 GB
- Uploaded By freecoursewb
- Downloads 212
- Last checked 1 day ago
- Date uploaded 3 months ago
- Seeders 12
- Leechers 1
Infohash : 6129D0C41E81164708502E642A3E3B65A11D3763
Mastering Basics of Cyber Threat Intelligence
https://WebToolTip.com
Published 11/2025
Created by Starweaver Team
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Beginner | Genre: eLearning | Language: English | Duration: 51 Lectures ( 3h 55m ) | Size: 2.1 GB
An introductory guide to the intelligence lifecycle, key sources, and practical applications in modern cybersecurity.
What you'll learn
Explain core principles, types, lifecycle, and role of cyber threat intelligence in defense.
Apply CIA Triad and risk management to turn data into actionable threat insights.
Describe core concepts, functions, and uses of Threat Intelligence Platforms (TIPs).
Use CTI tools to analyze threats, map tactics via MITRE ATT&CK, and plan responses.
Requirements
You need to have a basic understanding of cybersecurity concepts and familiarity with network protocols and security tools.
Files:
[ WebToolTip.com ] Udemy - Mastering Basics of Cyber Threat Intelligence- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 1 - What is Cyber Threat Intelligence
- 1 - Intro Video to Course.mp4 (59.1 MB)
- 2 - Introduction.mp4 (35.3 MB)
- 3 - What is Cyber Threat Intelligence.mp4 (37.3 MB)
- 4 - Roles and Responsibilities of CTI.mp4 (51.9 MB)
- 5 - CTI in Action.mp4 (28.3 MB)
- 1 - Introduction.mp4 (36.1 MB)
- 2 - Introduction to Key CTI Tools.mp4 (53.2 MB)
- 3 - Aggregating and Enriching Threat Indicators.mp4 (78.8 MB)
- 4 - Automating Threat Intelligence Workflows.mp4 (39.9 MB)
- 1 - MITRE ATT_CK Framework Fundamentals.mp4 (48.2 MB)
- 2 - Mapping Threat Indicators to ATT_CK TTPs.mp4 (80.1 MB)
- 3 - Using ATT_CK for Detection and Response.mp4 (87.0 MB)
- 1 - Simulating a Cyber Incident Scenario Setup.mp4 (38.1 MB)
- 2 - Identifying IOCs and Profiling Threat Actors.mp4 (80.5 MB)
- 3 - Recommending and Communicating Response Actions.mp4 (81.8 MB)
- 4 - Strengthening Cyber Defense with MISP.html (0.6 KB)
- 5 - HOL Bridging Intelligence and Response - Module 4_Cyber Threat Intelligence Tools and Incident Response (1).pdf (202.3 KB)
- 5 - HOL Bridging Intelligence and Response.html (0.5 KB)
- 6 - Project - Full-Spectrum Threat Response & Analysis - Course End Final Project.pdf (204.9 KB)
- 6 - Project - Full-Spectrum Threat Response & Analysis.html (0.4 KB)
- 7 - Course Wrap-up Video.mp4 (43.8 MB)
- 1 - Tactical Threat Intelligence.mp4 (45.7 MB)
- 2 - Operational Threat Intelligence.mp4 (45.2 MB)
- 3 - Strategic Threat Intelligence.mp4 (43.1 MB)
- 1 - Direction_ Discovery_ and Collection.mp4 (45.3 MB)
- 2 - Processing and Analysis.mp4 (40.9 MB)
- 3 - Delivering Actionable Intelligence.mp4 (51.2 MB)
- 4 - An introduction to threat intelligence.html (0.8 KB)
- 5 - HOL - Simulated Intel Navigating the Threat Intelligence Lifecycle - Module 1_Foundations of Cyber Threat Intelligence (1).pdf (198.7 KB)
- 5 - HOL - Simulated Intel Navigating the Threat Intelligence Lifecycle.html (0.4 KB)
- 1 - Introduction.mp4 (33.4 MB)
- 2 - Best Practices for Confidentiality.mp4 (45.8 MB)
- 3 - Principles of Data and Information Integrity.mp4 (41.6 MB)
- 4 - Continuous Access and Business Resilience.mp4 (52.1 MB)
- 1 - Identifying Assets at Risk.mp4 (45.0 MB)
- 2 - Threat and Vulnerability Assessment.mp4 (49.9 MB)
- 3 - Selecting and Actioning Control Strategies.mp4 (47.4 MB)
- 1 - Direction_ Discovery_ and Collection.mp4 (47.3 MB)
- 2 - Processing and Analysis.mp4 (51.7 MB)
- 3 - Sharing Intelligence to Improve and Adapt.mp4 (54.0 MB)
- 4 - Data Integrity Detecting and Responding to Ransomware and Other Destructive.html (0.8 KB)
- 5 - HOL - From Threat to Insight A CIA Triad Analysis Exercise - Module 2_Information Security Principles (1).pdf (197.7 KB)
- 5 - HOL - From Threat to Insight A CIA Triad Analysis Exercise.html (0.4 KB)
- 1 - Introduction.mp4 (42.1 MB)
- 2 - Defining Threat Intelligence Platform (TIP).mp4 (47.4 MB)
- 3 - Capabilities of a TIP.mp4 (41.1 MB)
- 4 - TIP vs. Other Cyber Threat Intelligence Tools.mp4 (55.3 MB)
- 1 - TIP Integration Flow.mp4 (59.3 MB)
- 2 - Real-Time Monitoring and Feedback Loops.mp4 (44.8 MB)
- 3 - Why a TIP Is Special.mp4 (39.7 MB)
- 1 - TIPs in Action.mp4 (43.1 MB)
- 2 - Enhancing Cyber Defense with TIPs.mp4 (47.0 MB)
- 3 - The Future of TIPs.mp4 (50.0 MB)
- 4 - Threat Intelligence Complete Guide to Process and Technology.html (1.0 KB)
- 5 - HOL - TIPs and Tomorrow Advancing Cyber Defense with Intelligence Platforms - Module 3_Operationalizing CTI - Threat Intelligence Platform (TIP) (1).pdf (204.2 KB)
- 5 - HOL - TIPs and Tomorrow Advancing Cyber Defense with Intelligence Platforms.html (0.6 KB)
- Bonus Resources.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce