• training@skillsforafrica.org
    info@skillsforafrica.org

Cybersecurity Threat Intelligence: Proactive Defense Against Evolving Threats

Introduction:

In the ever-evolving landscape of cyber threats, reactive security measures are no longer sufficient. This course on Cybersecurity Threat Intelligence equips participants with the specialized knowledge and skills to implement proactive threat detection and risk management strategies. Participants will learn how to gather, analyze, and disseminate actionable threat intelligence, enabling organizations to anticipate and mitigate potential cyberattacks. This course bridges the gap between traditional security operations and intelligence-driven defense, empowering professionals to fortify their organization's cybersecurity posture.

Target Audience:

This course is designed for cybersecurity professionals seeking to enhance their threat intelligence capabilities, including:

  • Security Analysts
  • Incident Responders
  • Security Engineers
  • Threat Hunters
  • IT Managers
  • Anyone responsible for proactive cybersecurity defense

Course Objectives:

Upon completion of this Cybersecurity Threat Intelligence course, participants will be able to:

  • Understand the principles and methodologies of cybersecurity threat intelligence.
  • Gather and analyze threat intelligence from various sources (OSINT, commercial, etc.).
  • Utilize threat intelligence platforms and tools effectively.
  • Develop threat intelligence reports and actionable insights.
  • Implement threat hunting and proactive threat detection strategies.
  • Understand the cyber kill chain and MITRE ATT&CK framework.
  • Analyze malware and adversary tactics, techniques, and procedures (TTPs).
  • Develop strategies for threat intelligence sharing and collaboration.
  • Integrate threat intelligence into security operations and incident response.
  • Understand the importance of contextualizing and prioritizing threat intelligence.
  • Enhance their ability to proactively identify and mitigate cyber risks.
  • Improve their organization's threat detection and response capabilities.
  • Contribute to improved cybersecurity posture and resilience within their organization.
  • Stay up-to-date with the latest trends and best practices in threat intelligence.
  • Become a more knowledgeable and effective threat intelligence professional.
  • Understand ethical considerations in threat intelligence gathering and sharing.
  • Learn how to use threat intelligence platforms and tools effectively.

DURATION

10 Days

COURSE CONTENT

Module 1: Introduction to Cybersecurity Threat Intelligence (CTI)

  • Understanding the concepts and importance of CTI.
  • The evolution of CTI and its role in modern cybersecurity.
  • Key terms and definitions in threat intelligence.
  • The CTI lifecycle (planning, collection, processing, analysis, dissemination).
  • Understanding the different types of threat intelligence (strategic, tactical, operational, technical).

Module 2: Threat Intelligence Planning and Requirements

  • Defining intelligence requirements (IRs) and priorities.
  • Developing a threat intelligence plan.
  • Identifying stakeholders and their information needs.
  • Establishing intelligence collection priorities.
  • Aligning CTI with organizational risk management.

Module 3: Threat Intelligence Collection Methodologies

  • Open-source intelligence (OSINT) gathering techniques.
  • Utilizing commercial threat intelligence feeds and platforms.
  • Human intelligence (HUMINT) and insider threat detection.
  • Technical intelligence (TECHINT) and malware analysis.
  • Network traffic analysis and log collection.

Module 4: Threat Intelligence Processing and Analysis

  • Data normalization and enrichment techniques.
  • Utilizing threat intelligence platforms (TIPs) for data aggregation.
  • Analyzing threat indicators and patterns.
  • Developing threat profiles and adversary personas.
  • Utilizing the diamond model of intrusion analysis.

Module 5: Threat Intelligence Analysis Frameworks and Methodologies

  • The cyber kill chain and its applications.
  • The MITRE ATT&CK framework and its use in TTP analysis.
  • Utilizing structured analytical techniques (SATs).
  • Developing hypotheses and validating findings.
  • Analyzing adversary motivations and intent.

Module 6: Malware Analysis and Reverse Engineering

  • Static and dynamic malware analysis techniques.
  • Utilizing malware analysis tools (e.g., IDA Pro, Ghidra, Cuckoo Sandbox).
  • Analyzing malware behavior and capabilities.
  • Extracting indicators of compromise (IOCs) from malware.
  • Understanding malware families and trends.

Module 7: Network Traffic Analysis and Intrusion Detection

  • Network protocol analysis and packet capture.
  • Utilizing network intrusion detection systems (NIDS) and intrusion prevention systems (NIPS).
  • Analyzing network traffic anomalies and suspicious activity.
  • Utilizing network flow data for threat detection.
  • Understanding network security monitoring (NSM) principles.

Module 8: Threat Hunting and Proactive Threat Detection

  • Developing threat hunting methodologies and techniques.
  • Utilizing threat hunting tools and platforms.
  • Proactively searching for hidden threats and anomalies.
  • Developing threat hunting hypotheses and scenarios.
  • Automating threat hunting tasks.

Module 9: Threat Intelligence Dissemination and Reporting

  • Developing threat intelligence reports and briefings.
  • Utilizing threat intelligence sharing platforms (e.g., MISP, STIX/TAXII).
  • Tailoring intelligence reports to different audiences.
  • Communicating threat intelligence effectively.
  • Developing actionable intelligence products.

Module 10: Threat Intelligence Sharing and Collaboration

  • Understanding the importance of threat intelligence sharing.
  • Participating in information sharing and analysis centers (ISACs).
  • Utilizing threat intelligence sharing standards and protocols.
  • Developing strategies for collaborating with law enforcement and other organizations.
  • Understanding legal and ethical considerations in threat intelligence sharing.

Module 11: Integrating Threat Intelligence into Security Operations

  • Integrating threat intelligence into SIEM systems.
  • Utilizing threat intelligence for incident response and forensics.
  • Automating threat intelligence integration with security tools.
  • Developing security orchestration, automation, and response (SOAR) playbooks.
  • Using threat intelligence to enhance vulnerability management.

Module 12: Threat Intelligence for Incident Response and Forensics

  • Utilizing threat intelligence to prioritize incident response efforts.
  • Analyzing adversary TTPs to understand incident scope and impact.
  • Utilizing threat intelligence for forensic investigations.
  • Developing incident response playbooks based on threat intelligence.
  • Post-incident threat intelligence analysis and lessons learned.

Module 13: Building a Threat Intelligence Program

  • Developing a threat intelligence program strategy.
  • Establishing a threat intelligence team and roles.
  • Selecting and implementing threat intelligence tools and platforms.
  • Developing metrics for measuring threat intelligence program effectiveness.
  • Continuous improvement and optimization of the threat intelligence program.

Module 14: Legal and Ethical Considerations in Threat Intelligence

  • Understanding legal and regulatory requirements for threat intelligence gathering and sharing.
  • Protecting privacy and civil liberties.
  • Maintaining confidentiality and data security.
  • Ethical considerations in OSINT and HUMINT.
  • Responsible disclosure and vulnerability management.

Module 15: Emerging Trends and Future of Threat Intelligence

  • Understanding the impact of AI and machine learning on threat intelligence.
  • Utilizing threat intelligence for proactive defense against emerging threats.
  • Exploring the role of threat intelligence in geopolitical cybersecurity.
  • Developing strategies for adapting to future threat landscapes.
  • Continuous learning and professional development in threat intelligence.

Training Approach

This course will be delivered by our skilled trainers who have vast knowledge and experience as expert professionals in the fields. The course is taught in English and through a mix of theory, practical activities, group discussion and case studies. Course manuals and additional training materials will be provided to the participants upon completion of the training.

Tailor-Made Course

This course can also be tailor-made to meet organization requirement. For further inquiries, please contact us on: Email: info@skillsforafrica.org, training@skillsforafrica.org Tel: +254 702 249 449

Training Venue

The training will be held at our Skills for Africa Training Institute Training Centre. We also offer training for a group at requested location all over the world. The course fee covers the course tuition, training materials, two break refreshments, and buffet lunch.

Visa application, travel expenses, airport transfers, dinners, accommodation, insurance, and other personal expenses are catered by the participant

Certification

Participants will be issued with Skills for Africa Training Institute certificate upon completion of this course.

Airport Pickup and Accommodation

Airport pickup and accommodation is arranged upon request. For booking contact our Training Coordinator through Email: info@skillsforafrica.org, training@skillsforafrica.org Tel: +254 702 249 449

Terms of Payment: Unless otherwise agreed between the two parties’ payment of the course fee should be done 5 working days before commencement of the training.

Course Schedule
Dates Fees Location Apply
07/04/2025 - 18/04/2025 $3000 Nairobi
14/04/2025 - 25/04/2025 $3500 Mombasa
14/04/2025 - 25/04/2025 $3000 Nairobi
05/05/2025 - 16/05/2025 $3000 Nairobi
12/05/2025 - 23/05/2025 $5500 Dubai
19/05/2025 - 30/05/2025 $3000 Nairobi
02/06/2025 - 13/06/2025 $3000 Nairobi
09/06/2025 - 20/06/2025 $3500 Mombasa
16/06/2025 - 27/06/2025 $3000 Nairobi
07/07/2025 - 18/07/2025 $3000 Nairobi
14/07/2025 - 25/07/2025 $5500 Johannesburg
14/07/2025 - 25/07/2025 $3000 Nairobi
04/08/2025 - 15/08/2025 $3000 Nairobi
11/08/2025 - 22/08/2025 $3500 Mombasa
18/08/2025 - 29/08/2025 $3000 Nairobi
01/09/2025 - 12/09/2025 $3000 Nairobi
08/09/2025 - 19/09/2025 $4500 Dar es Salaam
15/09/2025 - 26/09/2025 $3000 Nairobi
06/10/2025 - 17/10/2025 $3000 Nairobi
13/10/2025 - 24/10/2025 $4500 Kigali
20/10/2025 - 31/10/2025 $3000 Nairobi
03/11/2025 - 14/11/2025 $3000 Nairobi
10/11/2025 - 21/11/2025 $3500 Mombasa
17/11/2025 - 28/11/2025 $3000 Nairobi
01/12/2025 - 12/12/2025 $3000 Nairobi
08/12/2025 - 19/12/2025 $3000 Nairobi