Products
-
Pre-order available now!
Building and Operating a Threat Intelligence Function and Team
CourseLearn the principles, mistakes to avoid, and secrets behind building and operating a successful threat intelligence function or team at any organization from an instructor who has done it for over 15 years.
-
Pre-order available now!
Integrating Threat Intelligence Into Security Operations
CourseDiverse security operations functions demand fully integrated threat intelligence. This course ensures SecOps teams are adept at consuming threat intel, provides feedback tips, and shares best practices on using threat intel for more effective SecOps
-
Pre-order available now!
Evolving Defense and Detection with Threat Intelligence
Course -
Pre-order available now!
Cyber Threat Attribution
CourseCyber Threat Attribution approaches the “who dun it” problem using real examples of high-quality and poor attribution. Learn about levels of attribution, soft and hard attribution, and assessing the confidence of others’ attribution.
-
Pre-order available now!
Threat Intelligence for Journalists
CourseFor journalists, policymakers, and those who redeliver threat intel, this course teaches you to read and evaluate threat intel. Learn tips on what’s important to say and avoid, valuable questions to ask sources, and to vet and evaluate information.
-
Pre-order available now!
Threat Intelligence for Red Team and Pen Testers
CourseCalling Red Teams and Pen Testers! Learn how to better emulate real adversaries so you can improve how you evaluate and test your defense, detection, and response against real world scenarios. This course focuses heavily on exercises and case studies