Description
Building Cyber Threat Intelligence Capabilities — Course Overview
Quick Highlights
- Format: Video lessons, downloadable slides, and lab exercises.
- Duration: Self-paced — modular lessons you can complete in sequence.
- Level: Intermediate — suited for security analysts, SOC team members, and threat hunters.
What You’ll Learn
Throughout the course you will gain real, usable skills. Furthermore, each module builds on the last to create a full CTI capability inside your organization.
- Threat intelligence lifecycle: collection, processing, analysis, dissemination, and feedback.
- Threat actor profiling and TTP analysis using frameworks such as MITRE ATT&CK.
- Open-source intelligence (OSINT) collection techniques and tooling.
- Strategic, operational, and tactical intelligence: how to tailor outputs to stakeholders.
- Threat data enrichment, IOC normalization, and automated ingestion pipelines.
- Building playbooks: integrating CTI with SOC, SIEM, and incident response.
- Hands-on labs: analyzing malware artifacts, parsing network logs, and mapping activity to ATT&CK.
Requirements
To succeed in this course you should have a basic background in cybersecurity fundamentals. Moreover, prior exposure to networking, logs (SIEM), or incident response will accelerate your learning. You will need:
- A computer capable of running virtual machines or cloud labs.
- Basic knowledge of TCP/IP and common log formats.
- Willingness to run lab exercises and follow step-by-step guides.
Course Description & Learning Outcomes
This course provides a practical roadmap for setting up and scaling cyber threat intelligence capabilities. First, you will learn how to gather high-quality threat data from open sources and internal telemetry. Then, you will analyze and validate indicators of compromise, thereby turning raw data into actionable intelligence. Consequently, your team will be able to prioritize threats, tune detections, and inform incident response faster than before.
By the end of the course you will be able to:
- Design a CTI workflow that fits your organization’s maturity level.
- Use ATT&CK mapping to translate adversary behavior into defensive actions.
- Create intelligence reports and operational feeds that SOC teams can use immediately.
About the Publication
Authored by experienced threat analysts and instructors, this course draws on years of SOC, incident response, and threat-hunting experience. The team publishes practical labs and regular updates so you always learn current methods. Moreover, the material is designed to be concise, outcome-focused, and directly applicable to real-world operations.
Explore These Valuable Resources
Enroll Now
Ready to build real-world intelligence capabilities? Enroll today and start applying threat intelligence workflows immediately. Moreover, the course includes lab files and sample playbooks so you can implement changes in days, not months.
Discover more from Expert Training
Subscribe to get the latest posts sent to your email.


















Reviews
There are no reviews yet.