Use and integrate the cyber threat inteligence (CTI) lifecycle
This module aims to introduce the fundamentals of Cyber Threat Intelligence (CTI). The lectures will present the CTI lifecycle, highlight strategic integration and discuss emerging trends in this field. Students will learn how to identify threat intelligence data streams, apply the extracted information for vulnerability assessment and threat mitigation, and disseminate newly acquired knowledge into public databases.
Module Information
This module aims to introduce the fundamentals of Cyber Threat Intelligence (CTI). The lectures will present the CTI lifecycle, highlight strategic integration and discuss emerging trends in this field. Students will learn how to identify threat intelligence data streams, apply the extracted information for vulnerability assessment and threat mitigation, and disseminate newly acquired knowledge into public databases.
Key Details
This module is delivered in hybrid format, as a combination of online, in-person and self-learning activities. The module uses innovative hybrid learning methods that combine live (synchronous) and self-paced (asynchronous) activities, with particular focus on practical activities and real-world scenarios connected to cybersecurity. Expert tutors guide students through the material, ensuring a comprehensive learning experience.
This module aims to introduce the fundamentals of Cyber Threat Intelligence (CTI). Toward this goal the module employs periodic quizzes, in-class practical work and assignments.
- Time commitment:
Online activities: 14 hours - In-person activities: 14 hours
- Self-learning: 28 hours
- Individual, team and guided projects and activities: 69 hours
- Total: 125 hours
Credit points: 5 ECTS
Grading:
- Lecture Quizzes: 10%
- Lab Activity: 20%
- Assignments: 30%
- Exam: 40%
Subjects covered
Introduction to Cyber Threat Intelligence (CTI)
CTI lifecycle and cybersecurity frameworks
Strategic planning
Vulnerability management
Advanced threat actor profiling
Incident Response
The role of auditing in CTI
Automation using Elastic Stack
Emerging trends and the future of CTI
Review
Apply nowLearning objectives
Recognize different types of cyber threats and apply analytical techniques to assess their potential impact.
Gather threat data from open-source and proprietary sources, as well as structure it according to their needs.
Incorporate threat intelligence into (automated) incident response processes, improving the detection, investigation, and mitigation of attacks.
Use specialized platforms and tools to analyze threat data and share relevant information.
Utilize the acquired intelligence to guide proactive threat hunting efforts with the goal of identifying potential compromises and indicators of attack.
Apply nowModule leaders
Bogdan-Costel MOCANU is an Assistant Professor at the Faculty of Automatic Control and Computers, Department of Computer and Information Technology of the National University of Science and Technology POLITEHNICA Bucharest. He earned his Ph.D. in 2019 and continuously demonstrated remarkable growth and improvement in his expertise and contributions in multiple research areas, including Peer-to-Peer systems, Distributed systems, Cloud computing, Big Data, Real-time scheduling, and Information security.
Apply nowMaking Europe cyber-aware
Our digital world is under constant attack. Master the advanced skills to defend critical data and infrastructure. Become a sought-after expert in one of today’s most vital and in-demand career fields.
Download prospectus