Table of Contents
- Cyber Threat Intelligence Life Cycle
- Requirements and Intelligent Team Implementation
- Cyber Threat Intelligence Frameworks
- Cyber Threat Intelligence Tradecraft and Standards
- Goals Setting, procedures for CTI Strategy, and Practical Use Cases
- Cyber Threat Modeling and Adversary Analysis
- Threat Intelligence Data Sources
- Effective Defensive Tactics and Data Protection
- AI Application in Cyber Threat Analytics
- Threat Modeling and Analysis: - Practical Use Cases
- Usable Security: Threat Intelligence as part of the process
- SIEM Solutions and Intelligence-driven SOCs
- Threat Intelligence Metrics, Indicators of Compromise, and the Pyramid of Pain
- Threat Intelligence Reporting and Dissemination
- Threat Intelligence Sharing and Cyber Activity Attribution: Practical Use Cases

