Table of Contents – BPB Online
Skip to content
-
Basics of Threat Analysis and Modeling
-
Formulate a Threat Intelligence Model
- Adversary Data Collection Sources & Methods
-
Pivot Off and Extracting Adversarial Data
-
Primary Indicators of Security Compromise
-
Identify & Build Indicators of Compromise
-
Conduct Threat Assessments In Depth
-
Produce Heat Maps, Infographics & Dashboards
- Build Reliable & Robust Threat Intelligence System
-
Learn Statistical Approaches for Threat Intelligence
-
Develop Analytical Skills for Complex Threats
-
Planning for Disaster