Cyber Threat Intelligence
Where do you find the latest intelligence into evolving cyber threats? And how do you know who to trust? Cyber Threat Intelligence trains professionals to understand and act upon the cybersecurity-related information available to them. You will learn to identify open-source, third-party and internal sources of threat intelligence; evaluate the worth and applicability of intelligence within your organization and industry; summarize gathered intelligence in a manner that is clear and intelligible to all audiences; and operationalize intelligence within your security team.
Installment payments are now available on all course purchases!
No Mandatory Login Times
4-6 Hours of Work per Module
Your Subject Matter Expert:
Jeffrey Groman, CISSP
“What you really want to focus on are sources that provide you with a lot of details. Everything is about the details, especially when you want to apply cyber threat intelligence to something very specific.”
This focused cybersecurity course is ideal for managers who want to develop the knowledge necessary to adeptly assess and utilize complex threat intelligence. Sharpen your decision-making ability by developing an understanding of the forms that contemporary threat intelligence can take and explore real-world examples of threat intelligence in action.
Module 1: Gathering Threat Intelligence
Identify sources of threat intelligence. Develop a threat intelligence collection practice. Categorize types of threat intelligence. Identify key terminology related to threat intelligence collection.
Module 2: Analyzing Threat Intelligence
Determine the veracity, bias and priority of sources. Determine the applicability of sources to your industry and organization. Summarize key information from a source based on your target audience.
Module 3: Operationalizing Threat Intelligence
Identify applications of threat intelligence within an organization. Build a process for adding threat intelligence into security monitoring. Explain the Traffic Light Protocol (TLP) concept as it applies to operational security.
Module 4: Packaging and Maintaining Threat Intelligence
Compare different formats for threat intelligence content. Identify strategies for storing and maintaining threat intelligence. Explain the benefits of creating a robust threat intelligence storage system.
Windows Enterprise Incident Response
What does crime scene investigation look like if the scene is virtual? This Mandiant course teaches the fundamental investigative techniques you need to...
Network Traffic Analysis
This Mandiant course provides hands-on, tactical experience with network protocols, network architecture, intrusion detection systems, network traffic capture and traffic analysis. Reinforce technical...
Cybersecurity Risks and Industry
You might know everything you can about the cyber threat landscape, but do you have a plan of action to utilize that knowledge?...
Cybersecurity Foundations and Frameworks
In our volatile digital world, the cyber threats you don’t know about are the most dangerous ones there are. Cybersecurity Foundations and Frameworks...
What cyber threats might your company realistically face today? How will you orchestrate the resources at your disposal to defend against them? Cybersecurity Cases teaches...
Thrown in the deep end of cybersecurity without sufficient training? This Mandiant course introduces students to foundational elements of cybersecurity programs, including security...
Jeffrey Groman, CISSP
Jeffrey Groman, founder of Groman Consulting Group, is dedicated to helping organizations identify and resolve their greatest cybersecurity risks. Mr. Groman has worked in the security field for more than 20 years. As a cybersecurity consultant, he has guided major corporations, including banks, insurance companies and software providers through risk prevention and rapid response to incidents and security breaches.
Mr. Groman is certified in forensic analysis and application security, and previously worked with Mandiant Security Consulting Services and FireEye, providing strategic and incident response consulting to security teams and educating executives through delivery of SOC assessments. In these roles, Mr. Groman led a team of consultants and functional experts in working with a wide range of clients across multiple verticals, including NYC Health and Hospitals, Blue Cross Blue Shield Association, Ameriprise Financial, American Express, Ally, Huntington National Bank, Eaton, Caterpillar, DST Systems, Sprint and TransAmerica.
Mr. Groman is passionate about cybersecurity and partnering with clients to find solutions to complex issues. His book “Avoid These 11 Pitfalls and Minimize the Pain of Your Next Data Breach” is designed to help organizations learn from his decades of real-world experience. He has presented at Information Systems Security Association (ISSA) International, NetSecure, and Infragard conferences; briefed boards of directors; conducted tabletop exercises and workshops; and helped clients build security processes to be better prepared for the inevitable.
Mr. Groman has a BS in Electrical and Computer Engineering from the University of Colorado, Boulder.