Threat Intelligence Lifecycle Management
                                Training Provider: SINGAPORE MANAGEMENT UNIVERSITY                            
                            
                            
                                Course Reference: TGS-2020503014                            
                            
                                                            
                                                    
                                S$600                            
                                                            
                                    Original: S$2,000                                
                                
                                    Save S$1,400                                
                                                    About This Course
In this workshop, participants will learn about the phases applicable in the threat intelligent lifecycle including the goals, artifacts, sources, criteria and relevant deliverables applicable in each phase; how to select and use the relevant automation tools - data collection, analysis and visualisation; scope and requirements (e.g. SIEM vs intelligence-focused tool); use case review; how to identify the sources of threat intelligence feeds and correlate the threats with the related feeds.
What You'll Learn
1.      Threat intelligence lifecycle (covering Goals, artifacts, sources, criteria and relevant deliverables applied in each phase)
- Collection
- Processing
- Analysis & Production
- Distribution & feedback
2. Use of Automation tools – data collection, analysis and visualisation
- Selection of tools
- Scope and requirements (eg SIEM vs intelligence-focused)
3. Use case review
- Identify the sources of threat intelligence feeds
- Correlate the threats with the related feeds
                                - Collection
- Processing
- Analysis & Production
- Distribution & feedback
2. Use of Automation tools – data collection, analysis and visualisation
- Selection of tools
- Scope and requirements (eg SIEM vs intelligence-focused)
3. Use case review
- Identify the sources of threat intelligence feeds
- Correlate the threats with the related feeds
Entry Requirements
Basic IT knowledge & fundamentals of cybersecurity
Course Details
                                    
                                    
                                    
                                    
                                    
                                    
                                        Back to All Courses
                                    
                                    
                                    
                            
                                        Note: To apply for this course, visit the SkillsFuture website or contact the training provider directly.
                                    
                                More Courses from SINGAPORE MANAGEMENT UNIVERSITY
                                        In today’s rapidly evolving technological landscape, the emphasis on digital transformation is mor...                                    
                                    
                                    
                                    
                                    
                                
                                        This certificate programme is designed for non-technical professionals who want to develop data visu...                                    
                                    
                                    
                                    
                                    
                                
                                        This programme covers the operational aspects of data protection and information security. It seeks ...