In this course, you will learn how to implement open source threat intelligence sharing and analysis using MISP.
In this course, you will learn how to implement open source threat intelligence sharing and analysis using MISP.
A major part of the threat intelligence cycle is the analysis and distribution of credible information, tactics, techniques and procedures and exploitations. MISP is one of a series of tools which effectively allows for the storing and dissemination of a wide range of cyber threat intelligence types. In this course, you’ll cover how to utilize MISP to detect and protect against indicators of compromise in an enterprise environment as part of the Threat Intelligence Program. First, you’ll get an understanding of what MISP is and how it can enhance your organizational Threat Intelligence Program. Next, you’ll understand how MISP is used throughout the intelligence sharing community and works as a mitigation technique within Mitre. Finally, you will understand how to install and configure MISP and analyze a variety of threat indicators of compromise, anomalies, and events. When you’re finished with this course, you’ll have the skills and knowledge to implement these detection techniques using MISP.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.