Products
-
Pre-order available now!
Presenting Threat Intelligence
CourseWritten and verbal communication skills define the best cybersecurity analysts. This course will teach you the best presentation techniques, how to create great presentation slides, and how to drive decisions with compelling arguments.
-
Pre-order available now!
Building and Operating a Threat Intelligence Function and Team
CourseLearn the principles, mistakes to avoid, and secrets behind building and operating a successful threat intelligence function or team at any organization from an instructor who has done it for over 15 years.
-
Pre-order available now!
Integrating Threat Intelligence Into Security Operations
CourseDiverse security operations functions demand fully integrated threat intelligence. This course ensures SecOps teams are adept at consuming threat intel, provides feedback tips, and shares best practices on using threat intel for more effective SecOps
-
Pre-order available now!
Evolving Defense and Detection with Threat Intelligence
Course -
Pre-order available now!
Cyber Threat Attribution
CourseCyber Threat Attribution approaches the “who dun it” problem using real examples of high-quality and poor attribution. Learn about levels of attribution, soft and hard attribution, and assessing the confidence of others’ attribution.
-
Pre-order available now!
Threat Intelligence for Journalists
CourseFor journalists, policymakers, and those who redeliver threat intel, this course teaches you to read and evaluate threat intel. Learn tips on what’s important to say and avoid, valuable questions to ask sources, and to vet and evaluate information.