June 2022
Beginner
460 pages
11h 5m
English
Section 2 of Operationalizing Threat Intelligence builds upon Section 1 of the book with the introduction of core concepts related to how to collect, enrich, and analyze threat data and intelligence. This section addresses and answers the questions How to do I collect threat intelligence? and How do I perform threat hunting and pivoting? The chapters throughout Section 2 cover everything from understanding operational security to threat intelligence similarity clustering.
This part of the book comprises the following chapters:
Read now
Unlock full access