- 5.1 Data Analysis
- 5.2 Data Analysis Techniques
- 5.3 Threat Analysis
- 5.4 Threat Analysis Process
- 5.5 Fine-Tuning Threat Analysis
- 5.6 Threat Intelligence Evaluation
- 5.7 Create Runbooks and Knowledge Base
- 5.8 Threat Intelligence Tools
Labs:
- Perform Threat Modeling and Data Analysis
- Perform Complete Threat Intelligence using Threat Intelligence Tools
Key topics covered:
Data Analysis, Types of Data Analysis, Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), Threat Analysis, Types of Threat Intelligence Analysis, Threat Analysis Process, Threat Modeling Methodologies, Threat Analysis Process with Diamond Model Framework, Validating and Prioritizing Threat Indicators, Fine-Tuning Threat Analysis, Automate Threat Analysis Processes, Threat Intelligence Evaluation, Threat Attribution, Creating Runbooks, Threat Knowledge Base, and Threat Intelligence Tools