In today’s rapidly evolving threat landscape, cyberattacks like ransomware, phishing, and data breaches demand more than reactive defense. This course introduces the fundamentals of Cyber Threat Intelligence (CTI), empowering learners to anticipate threats, analyze adversary behavior, and produce actionable insights that inform security strategy.


您将学到什么
Explain core principles, types, lifecycle, and role of cyber threat intelligence in defense.
Apply CIA Triad and risk management to turn data into actionable threat insights.
Describe core concepts, functions, and uses of Threat Intelligence Platforms (TIPs).
Use CTI tools to analyze threats, map tactics via MITRE ATT&CK, and plan responses.
您将获得的技能
- Data Integrity
- Endpoint Detection and Response
- Automation
- Information Assurance
- Threat Management
- Cybersecurity
- Cyber Threat Intelligence
- Vulnerability Assessments
- Cyber Security Strategy
- Continuous Monitoring
- Risk Management Framework
- Threat Modeling
- Security Information and Event Management (SIEM)
- Technical Communication
- Cyber Threat Hunting
- Incident Response
- MITRE ATT&CK Framework
- Cyber Security Assessment
- Security Controls
- Threat Detection
要了解的详细信息
了解顶级公司的员工如何掌握热门技能

该课程共有6个模块
In this course, you’ll learn how to transform raw cyber data into actionable intelligence to anticipate, detect, and respond to evolving threats. You’ll explore the full cyber threat intelligence (CTI) lifecycle, from collection and analysis to reporting and application, while using frameworks like MITRE ATT&CK and tools such as SIEM, SOAR, and Threat Intelligence Platforms. Through real-world case studies, hands-on exercises, and guided analysis, you’ll develop the skills to identify attacker tactics, integrate intelligence into security operations, and strengthen your organization’s defense posture.
涵盖的内容
1个视频1篇阅读材料
In this module, you’ll explore the foundations of Cyber Threat Intelligence (CTI) and its vital role in modern cybersecurity. You’ll discover how CTI transforms raw data into actionable intelligence, examine the differences between data, information, and intelligence, and understand who uses CTI and why. Through real-world examples and an in-depth look at the Threat Intelligence Lifecycle, you’ll learn how organizations gather, analyze, and apply intelligence to defend against evolving cyber threats. This module lays the groundwork for building intelligence-driven security strategies across operational, tactical, and strategic levels.
涵盖的内容
10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题
In this module, you’ll explore how core information security principles underpin the development and application of Cyber Threat Intelligence (CTI). You’ll examine the CIA Triad—Confidentiality, Integrity, and Availability—as the foundation for secure data handling and resilient threat intelligence operations. You’ll also learn how risk management frameworks turn intelligence into action, guiding asset prioritization, vulnerability assessment, and control selection. Through practical applications and real-world examples, you’ll discover how to apply these principles across the CTI lifecycle to ensure intelligence is accurate, timely, and actionable.
涵盖的内容
10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题
In this module, you’ll gain hands-on experience using Cyber Threat Intelligence (CTI) tools and frameworks to detect, analyze, and respond to cyber threats. You’ll learn to identify Indicators of Compromise (IOCs), map attacker behavior using MITRE ATT&CK, and translate intelligence into clear, actionable response strategies. Through guided simulations and real-world exercises, you’ll build confidence in using CTI to strengthen both proactive defense and incident response operations. By the end, you’ll understand how intelligence-driven actions can minimize risk, reduce response time, and improve overall cyber resilience.
涵盖的内容
10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题
In this module, you’ll gain hands-on experience using Cyber Threat Intelligence (CTI) tools and frameworks to detect, analyze, and respond to cyber threats. You’ll learn to identify Indicators of Compromise (IOCs), map attacker behavior using MITRE ATT&CK, and translate intelligence into clear, actionable response strategies. Through guided simulations and real-world exercises, you’ll build confidence in using CTI to strengthen both proactive defense and incident response operations.
涵盖的内容
10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题
In this final module, you’ll bring together everything you’ve learned across the course—foundations of cyber threat intelligence, information security principles, TIP integrations, and incident response. You’ll apply your skills in a project that challenges you to analyze a real-world cyber incident, identify threat actors, assess malware, and design an actionable intelligence report.
涵盖的内容
1个视频1次同伴评审
提供方
从 Security 浏览更多内容
人们为什么选择 Coursera 来帮助自己实现职业发展




常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,
¹ 本课程的部分作业采用 AI 评分。对于这些作业,将根据 Coursera 隐私声明使用您的数据。









