Cyber Threat Intelligence
- IT & Software
- Jan 02, 2025

Cyber Threat Intelligence, available at $44.99, has an average rating of 4.57, with 145 lectures, based on 246 reviews, and has 1754 subscribers.
You will learn about Understand typical behavior patterns of adversaries, enabling you to predict and mitigate potential security breaches. Learn to effectively identify and analyze a wide range of cyber threats and to enable threat-informed defenses. Comprehensive Understanding of MITRE ATT&CK Explore industry best practices around CTI This course is ideal for individuals who are SOC Analyst or Security Engineer or Security Consultant or Security Architect or Security Manager or CISO or Red Team or Blue Team or Cybersecurity Professional or Ethical Hacker or Penetration Tester or Incident Handler It is particularly useful for SOC Analyst or Security Engineer or Security Consultant or Security Architect or Security Manager or CISO or Red Team or Blue Team or Cybersecurity Professional or Ethical Hacker or Penetration Tester or Incident Handler.
Enroll now: Cyber Threat Intelligence
Summary
Title: Cyber Threat Intelligence
Price: $44.99
Average Rating: 4.57
Number of Lectures: 145
Number of Published Lectures: 145
Number of Curriculum Items: 145
Number of Published Curriculum Objects: 145
Original Price: $19.99
Quality Status: approved
Status: Live
What You Will Learn
Who Should Attend
Target Audiences
Cyber Threat Intelligence (CTI) by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to master CTI to empower threat-informed defenses. This course systematically guides you from the basis to advanced concepts of CTI.
By mastering CTI, you’re developing expertise in essential topics in today’s cybersecurity landscape. Through this course, you’ll develop expertise in CTI, a comprehensive topic widely recognized for understanding tactics, techniques and procedures of adversaries and defending against cyber threats.
This deep dive into CTI equips you with the skills necessary for a cutting-edge career in cybersecurity.
Key Benefits for you:
SOC Basics: Understand the foundational structures of Security Operations Centers and their role in cybersecurity.
Azure Basics: Gain essential knowledge of Microsoft Azure’s infrastructure.
Zero Trust Basics: Learn the principles of the Zero Trust security model.
Intelligence: Explore the methods of collecting and analyzing data to predict and prevent threats.
CTI: Delve into the core techniques of Cyber Threat Intelligence to identify potential threats before they impact.
CTI Related Frameworks: Discover various frameworks that enhance the effectiveness of CTI processes.
MITRE ATT&CK: Study this globally-accessible knowledge base of adversary tactics and techniques.
Threat Actors and Advanced Persistent Threats: Identify common adversaries in cyber warfare.
CTI Tools: Get hands-on experience with the tools that professionals use for CTI gathering and analysis.
CTI Platforms: Familiarize yourself with platforms specifically designed for managing and operationalizing CTI.
AI & CTI: Explore the intersection of Artificial Intelligence and CTI to enhance threat detection.
Case Study I – MISP on Azure: Analyze how the MISP threat intelligence platform can be implemented on Azure to manage CTI.
Case Study II: Researching APT41 with ATT&CK: Understand the approach to investigating the TTPs of APT41 using the MITRE ATT&CK framework.
Case Study III: Leveraging CTI in Microsoft Sentinel: See practical applications of CTI in enhancing Microsoft Sentinel’s threat detection capabilities.
Case Study IV: Building a CTI Program: Learn from a comprehensive blueprint on setting up a successful CTI program within an organization.
Course Curriculum
Chapter 1: Introduction
Lecture 1: Welcome
Lecture 2: Course Slides
Lecture 3: IMPORTANT – Basics
Lecture 4: IMPORTANT – Demos
Lecture 5: FAQs
Chapter 2: Basics – SOC
Lecture 1: Complexity and Cyber Security Challenges
Lecture 2: What is a SOC?
Lecture 3: SOC Model
Lecture 4: Cyber Security Incident Response Process
Lecture 5: EDR, XDR, SIEM & SOAR
Lecture 6: Blue, Red and Purple Teaming
Chapter 3: Basics – Azure
Lecture 1: Cloud Computing Properties
Lecture 2: Cloud Computing Types
Lecture 3: Azure Global Backbone
Lecture 4: Shared Responsibility Model
Lecture 5: Azure Resource Hierarchy
Lecture 6: Azure Subscription Types
Lecture 7: Entra ID Tenants and Azure Subscriptions
Chapter 4: Basics – Zero Trust & Microsoft Security
Lecture 1: What is Zero Trust?
Lecture 2: The Microsoft Security Cosmos
Lecture 3: Defending Across Attack Chains
Chapter 5: Intelligence
Lecture 1: What is Intelligence?
Lecture 2: Observe, Orient, Decide & Act
Lecture 3: The Intelligence Cycle
Lecture 4: Analysis of Competing Hypotheses (ACH)
Lecture 5: The Traffic Light Protocol (TLP)
Lecture 6: Sources of Intelligence
Lecture 7: Levels of Intelligence
Chapter 6: Cyber Threat Intelligence (CTI)
Lecture 1: What is CTI?
Lecture 2: Intelligence, Threat Intelligence and Cyber Threat Intelligence
Lecture 3: What is a Threat?
Lecture 4: Threat, Vulnerability & Risk
Lecture 5: Threat-informed Defense
Lecture 6: Tactics, Techniques & Procedures (TTPs)
Lecture 7: IOCs and IOAs
Lecture 8: Indicator Lifecycle
Lecture 9: Pyramid of Pain
Lecture 10: Pivoting
Lecture 11: Threat Hunting
Lecture 12: CTI Sources
Chapter 7: CTI-Related Frameworks
Lecture 1: Diamond Model
Lecture 2: Lockheed Martin Cyber Kill Chain
Lecture 3: MITRE ATT&CK
Chapter 8: MITRE ATT&CK
Lecture 1: Mapping ATT&CK to the Pyramid of Pain
Lecture 2: Matrices
Lecture 3: Tactics
Lecture 4: Techniques
Lecture 5: Subtechniques
Lecture 6: Tactics, Techniques & Subtechniques
Lecture 7: Data Sources
Lecture 8: Detections
Lecture 9: Mitigations
Lecture 10: Groups
Lecture 11: Software
Lecture 12: Campaigns
Lecture 13: Relations
Lecture 14: Speaking one language
Lecture 15: Threat-Informed Decision Making
Lecture 16: Demo: Enterprise Matrix
Lecture 17: Demo: ATT&CK Navigator
Lecture 18: Purple Teaming with ATT&CK
Lecture 19: Evolution of ATT&CK
Chapter 9: Threat Actors and APTs
Lecture 1: Threat Actors: Types & Motivations
Lecture 2: APT: Sandworm & NotPetya
Chapter 10: CTI Tools
Lecture 1: Demo: Install VirtualBox
Lecture 2: Demo: Install Kali Linux
Lecture 3: Demo: Configure Kali Keyboard Layout
Lecture 4: Demo: whois
Lecture 5: Demo: TheHarvester
Lecture 6: Demo: Spiderfoot
Chapter 11: CTI Platforms
Lecture 1: Demo: Pulsedive
Lecture 2: Demo: Shodan.io
Lecture 3: Demo: VirusTotal
Chapter 12: CTI Platforms II – Microsoft Defender XDR
Lecture 1: Demo: Activate and Assign Microsoft 365 E5
Lecture 2: What is Defender XDR?
Lecture 3: Demo: Configure RBAC
Lecture 4: Demo: Threat Analytics
Lecture 5: Demo: Intel Profiles
Lecture 6: Demo: Intel Explorer
Chapter 13: Generative & CTI
Lecture 1: What is an LLM?
Lecture 2: MITRE ATLAS
Lecture 3: Demo: Describe CTI
Lecture 4: Demo: Assist with IOCs
Lecture 5: Demo: Generate Threat Hunting Queries in KQL
Lecture 6: Demo: Generating YARA Rules
Chapter 14: Case Study I – MISP on Azure
Lecture 1: Scenario
Instructors

Christopher Nett
Cyber Security Architect | Cloud Security | Zero Trust
Rating Distribution
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
- Random Picks
- Popular
- Hot Reviews
- Acing Online Interviews on Zoom, Skype, and Video Calls
- The Family Academy Full Introductions
- Mastering SEO
- Life Insurance Annuity Ultimate Buyer’s Guide
- Crypto Trading Mastery (Scalping, Day trading, price action)
- Personal Finance
- Company Valuation Financial Modeling
- The Beginner Forex Trading Playbook
- 1YouTube Masterclass The Best Guide to YouTube Success
- 2Photoshop CC- Adjustement Layers, Blending Modes Masks
- 3Personal Finance
- 4The Architecture of Oscar Niemeyer
- 5SolidWorks Essential Training ( 2023 2024 )
- 6Advanced Photoshop Manipulations Tutorials Bundle
- 7ZB Trading Cryptocurrency Price Action Course
- 8Python for Absolute Beginners
- 1Linux Performance Monitoring Analysis Hands On !!
- 2Content Writing Mastery 1- Content Writing For Beginners
- 3Media Training for PrintOnline Interviews-Get Great Quotes
- 4Learn Facebook Ads from Scratch Get more Leads and Sales
- 5The Complete Digital Marketing Course Learn From Scratch
- 6C#- Start programming with C# (for complete beginners)
- 7[FREE] How to code 10 times faster with Emmet
- 8Driving Results through Data Storytelling