Products
-
Pre-order available now!
Integrating Threat Intelligence Into Security Operations
CourseDiverse security operations functions demand fully integrated threat intelligence. This course ensures SecOps teams are adept at consuming threat intel, provides feedback tips, and shares best practices on using threat intel for more effective SecOps
-
Pre-order available now!
Evolving Defense and Detection with Threat Intelligence
Course -
Pre-order available now!
Cyber Threat Attribution
CourseCyber Threat Attribution approaches the “who dun it” problem using real examples of high-quality and poor attribution. Learn about levels of attribution, soft and hard attribution, and assessing the confidence of others’ attribution.
-
Pre-order available now!
Threat Intelligence for Journalists
CourseFor journalists, policymakers, and those who redeliver threat intel, this course teaches you to read and evaluate threat intel. Learn tips on what’s important to say and avoid, valuable questions to ask sources, and to vet and evaluate information.
-
Pre-order available now!
Threat Intelligence for Red Team and Pen Testers
CourseCalling Red Teams and Pen Testers! Learn how to better emulate real adversaries so you can improve how you evaluate and test your defense, detection, and response against real world scenarios. This course focuses heavily on exercises and case studies
-
Pre-order available now!
Threat Intelligence for Incident Responders
CourseMake your incident response faster and better using threat intel! Learn how to consume threat intelligence during an incident to reduce adversary dwell time and to maximize collaboration with your intel providers to provide the best, timeliest intel.