Table of Contents
- Why You Need a Threat Intelligence Program
- Threat Actors, Campaigns, and Tooling
- Guidelines and Policies
- Threat Intelligence Frameworks, Standards, Models, and Platforms
- Operational Security (OPSEC)
- Technical Threat Intelligence – Collection
- Technical Threat Analysis – Enrichment
- Technical Threat Analysis – Threat Hunting and Pivoting
- Technical Threat Analysis – Similarity Analysis
- Preparation and Dissemination
- Fusion into Other Enterprise Operations
- Overview of Datasets and Their Practical Application
- Conclusion

