Products
-
Pre-order available now!
Evolving Defense and Detection with Threat Intelligence
Course -
Pre-order available now!
Cyber Threat Attribution
CourseCyber Threat Attribution approaches the “who dun it” problem using real examples of high-quality and poor attribution. Learn about levels of attribution, soft and hard attribution, and assessing the confidence of others’ attribution.
-
Pre-order available now!
Threat Intelligence for Journalists
CourseFor journalists, policymakers, and those who redeliver threat intel, this course teaches you to read and evaluate threat intel. Learn tips on what’s important to say and avoid, valuable questions to ask sources, and to vet and evaluate information.
-
Pre-order available now!
Threat Intelligence for Red Team and Pen Testers
CourseCalling Red Teams and Pen Testers! Learn how to better emulate real adversaries so you can improve how you evaluate and test your defense, detection, and response against real world scenarios. This course focuses heavily on exercises and case studies
-
Pre-order available now!
Threat Intelligence for Incident Responders
CourseMake your incident response faster and better using threat intel! Learn how to consume threat intelligence during an incident to reduce adversary dwell time and to maximize collaboration with your intel providers to provide the best, timeliest intel.
-
Pre-order available now!
Logic for Threat Intelligence
CourseIn this course, analysts will explore formal and informal logic methods and learn strategies to identify bias and logical fallacies. You’ll learn how best to produce and evaluate the most accurate threat intelligence through logical study.