Starweaver
Basics of Cyber Threat Intelligence
Starweaver

Basics of Cyber Threat Intelligence

Starweaver
Tom Themeles

位教师:Starweaver

包含在 Coursera Plus

深入了解一个主题并学习基础知识。
中级 等级

推荐体验

7 小时 完成
灵活的计划
自行安排学习进度
深入了解一个主题并学习基础知识。
中级 等级

推荐体验

7 小时 完成
灵活的计划
自行安排学习进度

您将学到什么

  • Explain core principles, types, lifecycle, and role of cyber threat intelligence in defense.

  • Apply CIA Triad and risk management to turn data into actionable threat insights.

  • Describe core concepts, functions, and uses of Threat Intelligence Platforms (TIPs).

  • Use CTI tools to analyze threats, map tactics via MITRE ATT&CK, and plan responses.

要了解的详细信息

可分享的证书

添加到您的领英档案

最近已更新!

November 2025

授课语言:英语(English)

了解顶级公司的员工如何掌握热门技能

Petrobras, TATA, Danone, Capgemini, P&G 和 L'Oreal 的徽标

该课程共有6个模块

In this course, you’ll learn how to transform raw cyber data into actionable intelligence to anticipate, detect, and respond to evolving threats. You’ll explore the full cyber threat intelligence (CTI) lifecycle, from collection and analysis to reporting and application, while using frameworks like MITRE ATT&CK and tools such as SIEM, SOAR, and Threat Intelligence Platforms. Through real-world case studies, hands-on exercises, and guided analysis, you’ll develop the skills to identify attacker tactics, integrate intelligence into security operations, and strengthen your organization’s defense posture.

涵盖的内容

1个视频1篇阅读材料

In this module, you’ll explore the foundations of Cyber Threat Intelligence (CTI) and its vital role in modern cybersecurity. You’ll discover how CTI transforms raw data into actionable intelligence, examine the differences between data, information, and intelligence, and understand who uses CTI and why. Through real-world examples and an in-depth look at the Threat Intelligence Lifecycle, you’ll learn how organizations gather, analyze, and apply intelligence to defend against evolving cyber threats. This module lays the groundwork for building intelligence-driven security strategies across operational, tactical, and strategic levels.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this module, you’ll explore how core information security principles underpin the development and application of Cyber Threat Intelligence (CTI). You’ll examine the CIA Triad—Confidentiality, Integrity, and Availability—as the foundation for secure data handling and resilient threat intelligence operations. You’ll also learn how risk management frameworks turn intelligence into action, guiding asset prioritization, vulnerability assessment, and control selection. Through practical applications and real-world examples, you’ll discover how to apply these principles across the CTI lifecycle to ensure intelligence is accurate, timely, and actionable.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this module, you’ll gain hands-on experience using Cyber Threat Intelligence (CTI) tools and frameworks to detect, analyze, and respond to cyber threats. You’ll learn to identify Indicators of Compromise (IOCs), map attacker behavior using MITRE ATT&CK, and translate intelligence into clear, actionable response strategies. Through guided simulations and real-world exercises, you’ll build confidence in using CTI to strengthen both proactive defense and incident response operations. By the end, you’ll understand how intelligence-driven actions can minimize risk, reduce response time, and improve overall cyber resilience.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this module, you’ll gain hands-on experience using Cyber Threat Intelligence (CTI) tools and frameworks to detect, analyze, and respond to cyber threats. You’ll learn to identify Indicators of Compromise (IOCs), map attacker behavior using MITRE ATT&CK, and translate intelligence into clear, actionable response strategies. Through guided simulations and real-world exercises, you’ll build confidence in using CTI to strengthen both proactive defense and incident response operations.

涵盖的内容

10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题

In this final module, you’ll bring together everything you’ve learned across the course—foundations of cyber threat intelligence, information security principles, TIP integrations, and incident response. You’ll apply your skills in a project that challenges you to analyze a real-world cyber incident, identify threat actors, assess malware, and design an actionable intelligence report.

涵盖的内容

1个视频1次同伴评审

位教师

Starweaver
Starweaver
458 门课程896,757 名学生
Tom Themeles
2 门课程489 名学生

提供方

Starweaver

从 Security 浏览更多内容

人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.
自 2018开始学习的学生
''能够按照自己的速度和节奏学习课程是一次很棒的经历。只要符合自己的时间表和心情,我就可以学习。'
Jennifer J.
自 2020开始学习的学生
''我直接将从课程中学到的概念和技能应用到一个令人兴奋的新工作项目中。'
Larry W.
自 2021开始学习的学生
''如果我的大学不提供我需要的主题课程,Coursera 便是最好的去处之一。'
Chaitanya A.
''学习不仅仅是在工作中做的更好:它远不止于此。Coursera 让我无限制地学习。'
Coursera Plus

通过 Coursera Plus 开启新生涯

无限制访问 10,000+ 世界一流的课程、实践项目和就业就绪证书课程 - 所有这些都包含在您的订阅中

通过在线学位推动您的职业生涯

获取世界一流大学的学位 - 100% 在线

加入超过 3400 家选择 Coursera for Business 的全球公司

提升员工的技能,使其在数字经济中脱颖而出

常见问题

¹ 本课程的部分作业采用 AI 评分。对于这些作业,将根据 Coursera 隐私声明使用您的数据。