Open Source Intelligence for Emerging Threats

  • Overview
  • Course Content
Overview

Open Source Intelligence for Emerging Threats

Course Description

Take a deep dive into how to use public sources to recognize and respond to malicious cyber activities. This course will help technical cybersecurity specialists track evolutionary and revolutionary aspects of cybersecurity threats in order to more effectively combat emerging threats. In addition, you will learn how to build and interpret threat models to assist with mitigation activities.

Course Content

THREAT MODELING

  • Interactive lab
  • System modeling
  • Threat identification
  • Evaluation

CASE STUDY

  • Varies by offering

THREAT INTELLIGENCE

  • Where to find intelligence
  • Strategies for dealing with volume

TOOLS

  • Tools used for modeling, intel, response
  • Lab

MITIGATION STRATEGIES

  • How to prepare for an attack
  • Lab

Session Details

  • Georgia Tech Research Institute (GTRI) employees are eligible to receive a discount.  If you are a GTRI employee, please go to the Organizational Development website and look for the coupon code under GT Professional Development. Review coupon instructions for more information.

Who Should Attend

This course is designed for experienced cybersecurity specialists.

Coding boot camp professional working on laptop

What You Will Learn

  • How to use publicly available sources to stay up-to-date on the latest activities in the cyber realm
  • How to triage data from diverse intelligence sources in order to prioritize and operationalize findings
  • How to extrapolate likely areas for future technique evolution
  • Methods for detecting and preventing advanced attacks from being realized within participant organizations
  • Sources for continuous information and technique discovery
  • Threat modeling
Cybersecurity professional working on computer

How You Will Benefit

  • Develop knowledge and skills for how to discover emerging threat tactics, techniques, and procedures.
  • Use gained intelligence to successfully identify and mitigate advanced attacks.
  • Gain a deeper understanding of at least one emerging threat as identified by Georgia Tech researchers.
  • Taught by Experts in the Field icon
    Taught by Experts in the Field
  • Grow Your Professional Network icon
    Grow Your Professional Network

The course schedule was well-structured with a mix of lectures, class discussions, and hands-on exercises led by knowledgeable and engaging instructors.

- Abe Kani
President

TRAIN AT YOUR LOCATION

We enable employers to provide specialized, on-location training on their own timetables. Our world-renowned experts can create unique content that meets your employees' specific needs. We also have the ability to deliver courses via web conferencing or on-demand online videos. For 15 or more students, it is more cost-effective for us to come to you.

  • Save Money
  • Flexible Schedule
  • Group Training
  • Customize Content
  • On-Site Training
  • Earn a Certificate
Learn More

Want to learn more about this course?