Products
- 
        
  
    Pre-order available now!  Presenting Threat IntelligenceCourseWritten and verbal communication skills define the best cybersecurity analysts. This course will teach you the best presentation techniques, how to create great presentation slides, and how to drive decisions with compelling arguments. 
- 
        
  
    Pre-order available now!  Building and Operating a Threat Intelligence Function and TeamCourseLearn the principles, mistakes to avoid, and secrets behind building and operating a successful threat intelligence function or team at any organization from an instructor who has done it for over 15 years. 
- 
        
  
    Pre-order available now!  Integrating Threat Intelligence Into Security OperationsCourseDiverse security operations functions demand fully integrated threat intelligence. This course ensures SecOps teams are adept at consuming threat intel, provides feedback tips, and shares best practices on using threat intel for more effective SecOps 
- 
        
  
    Pre-order available now!  Evolving Defense and Detection with Threat IntelligenceCourse
- 
        
  
    Pre-order available now!  Cyber Threat AttributionCourseCyber Threat Attribution approaches the “who dun it” problem using real examples of high-quality and poor attribution. Learn about levels of attribution, soft and hard attribution, and assessing the confidence of others’ attribution. 
- 
        
  
    Pre-order available now!  Threat Intelligence for JournalistsCourseFor journalists, policymakers, and those who redeliver threat intel, this course teaches you to read and evaluate threat intel. Learn tips on what’s important to say and avoid, valuable questions to ask sources, and to vet and evaluate information.