Cyber-Threat Intelligence and Information Sharing
Skip Ribbon Commands
Skip to main content
Skip Navigation Links.
Course Outline

Day 1: 

Morning Session: Lecture

Cyber Threat Intelligence (CTI)

  • The Why?
  • The What?

Use Cases (the how)

  • Sharing
  • Analysis
  • Response 
  • Attribution

Threat Analytics and its Challenges.

Afternoon Session: Written Hands-on Class Activity

Sense Making of provided Cyber Threat Incidence Report using CTI Models.

Evening: Home Reading Self-Study

Data-Driven Security Techniques based on provided video lecture.


Morning Session: Lecture

Review and Recap of home reading assignment

  • Develop basic understanding of security data extraction and processing.
  • Learn some introductory-level functions of the R Programming language.

Afternoon Session

  • Hands-on Computer Based Class Activity of exploratory data analysis and visualization of provided security data using R Programming Language.