Course Info

Date: Sep-01-2025

Length: 1 Week

City: Kuala Lumpur

Fees: 3,750

Type: In Classroom

Available Dates

  • June-09-2025

    Kuala Lumpur

  • Sep-01-2025

    Kuala Lumpur

  • Dec-01-2025

    Kuala Lumpur

Dates in Other Venues

  • Mar-17-2025

    Dubai

  • Apr-28-2025

    Barcelona

  • Apr-28-2025

    Singapore

  • Apr-28-2025

    Amsterdam

  • May-19-2025

    Dubai

  • June-02-2025

    London

  • June-09-2025

    Istanbul

  • June-09-2025

    Paris

  • July-21-2025

    Dubai

  • July-28-2025

    Barcelona

  • July-28-2025

    Singapore

  • July-28-2025

    Amsterdam

  • Sep-01-2025

    Paris

  • Sep-01-2025

    Istanbul

  • Sep-08-2025

    London

  • Oct-20-2025

    Dubai

  • Oct-27-2025

    Amsterdam

  • Oct-27-2025

    Singapore

  • Oct-27-2025

    Barcelona

  • Nov-17-2025

    Dubai

  • Dec-01-2025

    Paris

  • Dec-01-2025

    Istanbul

  • Dec-08-2025

    London

Course Details

Course Outline

5 days course

Cyber Threat Intelligence Fundamentals


  • Defining cyber threat intelligence (CTI) and its role in cybersecurity.
  • Exploring the phases of the intelligence cycle: planning and direction, collection, processing, analysis, and dissemination.
  • Identifying types of threat Intelligence: strategic, operational, tactical, and technical intelligence.
  • Discovering various threat actors and their objectives (Cybercriminals, Hacktivists, Nation-State Actors)
  • Understanding intelligence frameworks and their role in developing targeted cybersecurity strategies:
  • Cyber Kill Chain
  • Diamond Model
  • MITRE ATT&CK.
  • Discussing the steps to build and implement a CTI program within an organization.

Types of Compromise Indicators 


  • Defining Indicators of Compromise (IOCs) and how they are used to detect and respond to security incidents.
  • Exploring the various types of IOCs, such as IP addresses, URLs, file hashes, and domain names, and how they point to malicious activity.
  • Methods for collecting and analyzing IOCs effectively, both manually and with automation tools.
  • Identifying threat actor profiles that anticipate tactics and improve defenses.
  • Practical exercise: Matching IOCs to known threat actors and their associated TTPs.

Vulnerabilities and Attack Campaigns


  • Identifying common vulnerabilities and how cyber attackers exploit them.
  • Exploring common exploitation techniques such as privilege escalation, buffer overflows, and code injection.
  • Understanding the role of zero-day vulnerabilities and the risks they pose to organizations.
  • Analyzing attack campaigns, threat groups, and their objectives to identify patterns and trends.
  • The process of designing attack campaigns to TTPs and IOCs to build more effective defensive measures.
  • Practical exercise: Analyzing a real-world attack campaign and breaking down its tactics.

Threat Intelligence Risk Assessment 


  • Understanding types of threat intelligence feeds and how to leverage them for real-time data.
  • Exploring threat intelligence feeds integration into a Security Operations Center (SOC) for automated detection and response.
  • Steps to conduct risk assessments: evaluating threats, vulnerabilities, and their potential impact on the organization.
  • Analyzing the likelihood and severity of threats based on available intelligence and exposure.
  • Identifying geopolitical factors and industry trends that influence the types of cyber threats organizations face.
  • Practical exercise: Using CTI data to assess the risk of an emerging threat to an organization.

Advanced CTI Topics and Strategic Decision-Making 


  • Analyzing historical data and trends to improve future threat detection and defense strategies.
  • Addressing legal and compliance challenges when collecting and sharing CTI, ensuring privacy and adherence to regulations.
  • Strategies to align CTI with business goals to support strategic decision-making and long-term security planning.
  • Examining the role of CTI in incident response and digital forensics to identify attack root causes and reduce recovery time.
  • Discussing future trends in CTI, including the use of AI/ML for predictive analysis and automation.
  • Project: Developing a comprehensive CTI strategy for a fictional organization, incorporating lessons learned throughout the course.