June 2022
Beginner
460 pages
11h 5m
English
Section 3 continues exploring the core concept of Section 2: how to collect threat intelligence. In Section 3, we'll examine how threat intelligence can be used, productionized, or further leveraged throughout organizations of any type. This section focuses on what to do with technical threat intelligence after it's been collected and enriched, in addition to identifying areas where threat intelligence can be beneficial to an organization.
This part of the book comprises the following chapters:
Read now
Unlock full access