Chevron Left
返回到 Introduction to the Threat Intelligence Lifecycle

學生對 IBM 提供的 Introduction to the Threat Intelligence Lifecycle 的評價和反饋


Today, we are faced with the increasing challenges of dealing with more aggressive and persistent threat actors, while being inundated with information, which is full of misinformation and false flags across multiple, unconnected systems. With information coming from such a wide variety of sources, how do you tell what is reliable and actionable, and what isn't? The Threat Intelligence lifecycle is the planning, collecting, processing, analyzing, and disseminating of information to help mitigate potential attacks and harmful events by treat actors. In this course, you will learn to: - Describe the different phases of the Threat Intelligence lifecycle - Explain the levels of information - Identify different intelligence data sources - Explain procedures and techniques used to process and analyze information - Discuss distributing intelligence to different audiences...



1 - Introduction to the Threat Intelligence Lifecycle 的 2 個評論(共 2 個)

創建者 Ravshanov, K (


創建者 Tafida A