Skip to content
CSY301 Week 01 Advanced

Connect this week to foundational concepts you've already learned:

Threat Intelligence

Track your progress through this week's content

Opening Framing

Every day, security teams drown in data. Alerts flood dashboards, threat feeds deliver millions of indicators, and news reports breathlessly announce the latest breach. Yet despite this avalanche of information, organizations are still surprised by attacks. The problem isn't lack of data—it's lack of intelligence.

Threat intelligence transforms raw data into actionable knowledge. It answers the questions defenders need: Who is targeting us? What techniques do they use? Where should we focus our limited resources? Intelligence isn't just knowing that an IP address is malicious—it's understanding which adversary uses it, what campaign it's part of, what they're after, and how to detect and stop them.

This week introduces the fundamentals of threat intelligence: what it is, why it matters, and how it differs from raw security data. You'll learn the intelligence hierarchy, understand different intelligence types, and see how intelligence drives better security decisions across an organization.

Key insight: Data tells you what happened. Intelligence tells you what it means and what to do about it.

1) What is Threat Intelligence?

Threat intelligence is evidence-based knowledge about threats that enables informed decisions. Understanding this definition requires examining each component:

Threat Intelligence Definition:

"Evidence-based knowledge, including context, mechanisms,
indicators, implications, and actionable advice, about an
existing or emerging menace or hazard to assets that can
be used to inform decisions regarding the subject's
response to that menace or hazard."
                                        — Gartner

Breaking Down the Definition:

┌─────────────────────────────────────────────────────────────┐
│ EVIDENCE-BASED                                              │
│ - Grounded in observable facts                              │
│ - Not speculation or hype                                   │
│ - Verifiable and attributable                               │
├─────────────────────────────────────────────────────────────┤
│ KNOWLEDGE (not just data)                                   │
│ - Analyzed and contextualized                               │
│ - Connected to broader understanding                        │
│ - Interpreted for meaning                                   │
├─────────────────────────────────────────────────────────────┤
│ CONTEXT                                                     │
│ - Who is the adversary?                                     │
│ - Why are they doing this?                                  │
│ - What is their capability?                                 │
├─────────────────────────────────────────────────────────────┤
│ ACTIONABLE                                                  │
│ - Enables specific decisions                                │
│ - Drives defensive actions                                  │
│ - Prioritizes resource allocation                           │
└─────────────────────────────────────────────────────────────┘

Data vs. Information vs. Intelligence:

The Intelligence Hierarchy:

DATA (Raw facts):
"IP 10.0.0.50 connected to port 443"
- No context
- No meaning
- Just an observation

INFORMATION (Organized data):
"IP 10.0.0.50 is on a blocklist and connected to
our web server 47 times yesterday"
- Some context added
- Pattern recognized
- Still limited meaning

INTELLIGENCE (Analyzed information):
"IP 10.0.0.50 is a known Cobalt Strike C2 server
operated by APT29. The connection pattern matches
their standard beacon configuration. They typically
target organizations in our sector for intellectual
property theft. Our current detections would not
identify their lateral movement techniques."
- Full context
- Adversary attribution
- Capability assessment
- Defensive gap identified
- Actionable insight

The Transformation:
Data → (Collection) → Information → (Analysis) → Intelligence
                                           ↓
                                    Decision/Action

Why Threat Intelligence Matters:

Without Intelligence:
- React to every alert equally
- No prioritization of threats
- Defenders always behind attackers
- Security spending unfocused
- Same attacks succeed repeatedly

With Intelligence:
- Focus on relevant threats
- Prioritize by actual risk
- Proactive defensive posture
- Targeted security investments
- Learn from industry incidents

Business Value:

┌─────────────────────────────────────────────────────────────┐
│ Benefit                │ Example                            │
├────────────────────────┼────────────────────────────────────┤
│ Faster detection       │ Know what to look for              │
│ Reduced false positives│ Context eliminates noise           │
│ Better prioritization  │ Focus on real threats              │
│ Proactive defense      │ Patch before exploitation          │
│ Informed decisions     │ Board-level risk communication     │
│ Efficient spending     │ Invest where threats exist         │
└────────────────────────┴────────────────────────────────────┘

Key insight: Intelligence is not a product you buy—it's a capability you build. Threat feeds provide data; your analysis creates intelligence.

2) Types of Threat Intelligence

Threat intelligence serves different purposes depending on its scope, audience, and timeframe:

Intelligence Types by Level:

┌─────────────────────────────────────────────────────────────┐
│ STRATEGIC INTELLIGENCE                                      │
│                                                             │
│ Audience: Executives, board, senior leadership              │
│ Timeframe: Months to years                                  │
│ Format: Reports, briefings, assessments                     │
│                                                             │
│ Questions Answered:                                         │
│ - What threat actors target our industry?                   │
│ - How is the threat landscape evolving?                     │
│ - What risks require board-level attention?                 │
│ - Where should we invest in security?                       │
│                                                             │
│ Example: "State-sponsored actors are increasingly           │
│ targeting the financial sector for economic espionage.      │
│ Our current security posture has gaps in detecting          │
│ supply chain compromises."                                  │
├─────────────────────────────────────────────────────────────┤
│ OPERATIONAL INTELLIGENCE                                    │
│                                                             │
│ Audience: Security managers, IR teams, threat hunters       │
│ Timeframe: Days to months                                   │
│ Format: Campaign reports, adversary profiles                │
│                                                             │
│ Questions Answered:                                         │
│ - Who is behind this campaign?                              │
│ - What are their TTPs?                                      │
│ - What is their operational infrastructure?                 │
│ - How do similar attacks progress?                          │
│                                                             │
│ Example: "APT29 is conducting a phishing campaign           │
│ targeting COVID-19 vaccine research. They use               │
│ WellMess malware delivered via spearphishing."              │
├─────────────────────────────────────────────────────────────┤
│ TACTICAL INTELLIGENCE                                       │
│                                                             │
│ Audience: SOC analysts, detection engineers                 │
│ Timeframe: Hours to days                                    │
│ Format: IOCs, detection rules, technical indicators         │
│                                                             │
│ Questions Answered:                                         │
│ - What IPs/domains should we block?                         │
│ - What signatures should we deploy?                         │
│ - What artifacts indicate compromise?                       │
│ - How do we detect this specific technique?                 │
│                                                             │
│ Example: "Block IP 10.0.0.50 (C2), hash SHA256:abc123       │
│ (WellMess dropper), domain update.healthcare-ede.com"       │
└─────────────────────────────────────────────────────────────┘

Intelligence Consumers:

Matching Intelligence to Consumer:

┌────────────────────┬────────────────────┬───────────────────┐
│ Consumer           │ Needs              │ Intelligence Type │
├────────────────────┼────────────────────┼───────────────────┤
│ CEO/Board          │ Risk context       │ Strategic         │
│ CISO               │ Program direction  │ Strategic/Oper.   │
│ Security Manager   │ Team priorities    │ Operational       │
│ Threat Hunter      │ Hunt hypotheses    │ Operational/Tact. │
│ IR Team            │ Investigation leads│ Operational/Tact. │
│ SOC Analyst        │ Detection/triage   │ Tactical          │
│ Detection Engineer │ Rule development   │ Tactical          │
│ Vuln Management    │ Patch priority     │ Tactical/Oper.    │
└────────────────────┴────────────────────┴───────────────────┘

Common Mistake:
Giving tactical IOCs to executives ("Here are 500 malicious IPs")
Giving strategic assessments to SOC analysts ("APT groups are evolving")

Both are useless without matching format to consumer.

Technical vs. Non-Technical Intelligence:

Technical Intelligence:
- IP addresses, domains, URLs
- File hashes (MD5, SHA256)
- YARA rules
- Sigma detection rules
- Malware configurations
- Network signatures
- Exploit details

Non-Technical Intelligence:
- Adversary motivations
- Geopolitical context
- Industry targeting trends
- Attack likelihood assessments
- Risk prioritization
- Capability assessments
- Intent analysis

Complete Intelligence Requires Both:
"This IP (technical) is used by a financially-motivated
cybercrime group (non-technical) that targets retail
organizations (non-technical) using point-of-sale malware
with these characteristics (technical) typically during
holiday shopping seasons (non-technical)."

Key insight: The most valuable intelligence combines technical precision with contextual understanding. Neither alone is sufficient.

3) The Intelligence-Driven Security Model

Intelligence-driven security integrates threat intelligence into all security functions, moving from reactive to proactive defense:

Traditional vs. Intelligence-Driven Security:

TRADITIONAL (Reactive):
┌─────────────────────────────────────────────────────────────┐
│ Attack → Detection → Response → Recovery → Lessons Learned  │
│                                                             │
│ - Wait for attacks to happen                                │
│ - Respond to what we find                                   │
│ - Hope our defenses work                                    │
│ - Learn after damage is done                                │
└─────────────────────────────────────────────────────────────┘

INTELLIGENCE-DRIVEN (Proactive):
┌─────────────────────────────────────────────────────────────┐
│ Intelligence → Preparation → Detection → Response → Intel   │
│      ↑                                                 │    │
│      └─────────────────────────────────────────────────┘    │
│                                                             │
│ - Understand threats before attacks                         │
│ - Prepare defenses for likely adversaries                   │
│ - Detect based on known TTPs                                │
│ - Respond with adversary context                            │
│ - Feed findings back to intelligence                        │
└─────────────────────────────────────────────────────────────┘

Intelligence Integration Points:

Where Intelligence Enhances Security:

SECURITY OPERATIONS:
┌─────────────────────────────────────────────────────────────┐
│ Function              │ Intelligence Application            │
├───────────────────────┼─────────────────────────────────────┤
│ Alert Triage          │ Prioritize by threat actor relevance│
│ Detection Engineering │ Build rules for known TTPs          │
│ Threat Hunting        │ Hypothesis-driven searches          │
│ Incident Response     │ Adversary playbooks                 │
└───────────────────────┴─────────────────────────────────────┘

VULNERABILITY MANAGEMENT:
┌─────────────────────────────────────────────────────────────┐
│ Function              │ Intelligence Application            │
├───────────────────────┼─────────────────────────────────────┤
│ Patch Prioritization  │ Focus on exploited vulnerabilities  │
│ Risk Assessment       │ Consider adversary capability       │
│ Remediation Planning  │ Timeline based on threat urgency    │
└───────────────────────┴─────────────────────────────────────┘

SECURITY ARCHITECTURE:
┌─────────────────────────────────────────────────────────────┐
│ Function              │ Intelligence Application            │
├───────────────────────┼─────────────────────────────────────┤
│ Control Selection     │ Counter relevant techniques         │
│ Gap Analysis          │ Map defenses to adversary TTPs      │
│ Investment Priority   │ Address highest-risk gaps           │
└───────────────────────┴─────────────────────────────────────┘

RISK MANAGEMENT:
┌─────────────────────────────────────────────────────────────┐
│ Function              │ Intelligence Application            │
├───────────────────────┼─────────────────────────────────────┤
│ Threat Assessment     │ Realistic adversary profiles        │
│ Likelihood Estimation │ Evidence-based probability          │
│ Board Reporting       │ Contextualized risk communication   │
└───────────────────────┴─────────────────────────────────────┘

Threat-Informed Defense:

MITRE Threat-Informed Defense:

Concept:
Use knowledge of adversary behavior to drive:
- Defensive priorities
- Detection development
- Security testing
- Tool selection

Components:
1. Cyber Threat Intelligence (know your adversary)
2. Defensive Engagement (test your defenses)
3. Focused Sharing (collaborate with community)

Practical Application:

Step 1: Identify Relevant Threats
"Based on our industry and assets, APT groups X, Y, Z
are likely adversaries"

Step 2: Understand Their TTPs
"These groups commonly use techniques T1566, T1059,
T1055, T1021 from ATT&CK"

Step 3: Assess Current Detection
"We detect T1566 and T1059, but lack visibility
into T1055 and T1021"

Step 4: Prioritize Improvements
"Develop detections for T1055 (process injection)
first due to common use across all three groups"

Step 5: Validate Defenses
"Test detections using adversary emulation that
mimics these specific techniques"

Key insight: Intelligence should drive action at every level of security operations. If intelligence doesn't change what you do, it's not being used effectively.

4) Intelligence Sources

Threat intelligence comes from various sources, each with different strengths, limitations, and reliability:

Intelligence Source Categories:

INTERNAL SOURCES (Highest Relevance):
┌─────────────────────────────────────────────────────────────┐
│ Source                │ Value                               │
├───────────────────────┼─────────────────────────────────────┤
│ Security logs/SIEM    │ What's targeting YOUR environment   │
│ Incident data         │ What has actually happened          │
│ Threat hunting        │ Discovered adversary activity       │
│ Forensic analysis     │ Detailed adversary TTPs             │
│ User reports          │ Phishing attempts, suspicious events│
└───────────────────────┴─────────────────────────────────────┘

COMMUNITY SOURCES (High Relevance):
┌─────────────────────────────────────────────────────────────┐
│ Source                │ Value                               │
├───────────────────────┼─────────────────────────────────────┤
│ ISACs/ISAOs           │ Industry-specific threats           │
│ Trusted sharing groups│ Peer organization insights          │
│ Government alerts     │ National-level threat warnings      │
│ Vendor notifications  │ Technology-specific threats         │
└───────────────────────┴─────────────────────────────────────┘

COMMERCIAL SOURCES (Variable Relevance):
┌─────────────────────────────────────────────────────────────┐
│ Source                │ Value                               │
├───────────────────────┼─────────────────────────────────────┤
│ TI platforms          │ Aggregated indicators and context   │
│ Vendor research       │ Deep adversary analysis             │
│ Threat feeds          │ Bulk indicators for blocking        │
│ Dark web monitoring   │ Credential leaks, targeting         │
└───────────────────────┴─────────────────────────────────────┘

OPEN SOURCES (Broad Coverage):
┌─────────────────────────────────────────────────────────────┐
│ Source                │ Value                               │
├───────────────────────┼─────────────────────────────────────┤
│ Security blogs        │ Technique analysis, research        │
│ Malware repositories  │ Sample analysis, IOCs               │
│ Social media          │ Early warnings, researcher findings │
│ Government reports    │ Attribution, strategic context      │
│ Academic research     │ Novel techniques, trends            │
└───────────────────────┴─────────────────────────────────────┘

Source Evaluation:

Evaluating Intelligence Sources:

ADMIRALTY SYSTEM (Reliability + Credibility):

Source Reliability:
A - Completely reliable (verified history)
B - Usually reliable (trusted, minor errors)
C - Fairly reliable (some verified reporting)
D - Not usually reliable (history of errors)
E - Unreliable (known problems)
F - Cannot be judged (new source)

Information Credibility:
1 - Confirmed by other sources
2 - Probably true (logical, consistent)
3 - Possibly true (not confirmed)
4 - Doubtful (inconsistent)
5 - Improbable (contradicted)
6 - Cannot be judged (insufficient info)

Example Rating: "B2"
= Usually reliable source, probably true information

Questions to Ask:
- Who produced this intelligence?
- What is their track record?
- What is their access to information?
- Is this confirmed by other sources?
- How timely is this information?
- Does this apply to my environment?

Common Intelligence Sources:

Free/Open Sources:

Government:
- CISA Alerts and Advisories (cisa.gov)
- FBI Flash Reports
- NSA Cybersecurity Advisories
- UK NCSC Reports
- ASD ACSC Alerts (Australia)

Vendor Research:
- Mandiant (Google) Blog
- Microsoft Security Blog
- CrowdStrike Blog
- Recorded Future Blog
- Cisco Talos

Community:
- AlienVault OTX
- Abuse.ch (URLhaus, MalwareBazaar)
- VirusTotal
- MISP communities
- Twitter/X security research

Aggregators:
- The DFIR Report
- This Week in 4n6
- SANS ISC Diary
- BleepingComputer

Commercial Platforms:
- Recorded Future
- Mandiant Advantage
- CrowdStrike Falcon X
- Anomali ThreatStream
- ThreatConnect
- Intel 471

Key insight: No single source provides complete intelligence. Effective programs combine internal observations with external context from multiple sources.

5) Intelligence Program Foundations

Building an effective threat intelligence capability requires clear objectives, defined processes, and organizational support:

Intelligence Program Maturity Levels:

LEVEL 0 - None:
- No dedicated intelligence function
- Reactive security only
- Ad-hoc threat feed consumption

LEVEL 1 - Basic:
- Consume external threat feeds
- Basic IOC blocking
- Limited analysis capability
- Intelligence as IT function

LEVEL 2 - Developing:
- Dedicated analyst(s)
- Multiple source aggregation
- Basic reporting to stakeholders
- Some integration with operations

LEVEL 3 - Defined:
- Formal intelligence team
- Defined requirements process
- Regular intelligence products
- Integration across security functions
- Threat hunting program

LEVEL 4 - Managed:
- Intelligence-driven operations
- Adversary tracking programs
- Proactive threat research
- Community contribution
- Measurable business value

LEVEL 5 - Optimizing:
- Industry-leading capability
- Original research publication
- Government/peer collaboration
- Continuous improvement culture

Starting a Program:

Minimum Viable Intelligence Program:

Essential Elements:
1. Clear Requirements
   - What decisions need intelligence support?
   - Who are the consumers?
   - What threats are relevant?

2. Source Access
   - SIEM/internal logs (primary)
   - Free external sources (CISA, OTX, etc.)
   - Industry sharing group (ISAC)

3. Analysis Capability
   - At least one trained analyst
   - Basic analysis tools
   - Documentation system

4. Distribution Mechanism
   - Regular reporting cadence
   - Appropriate formats for consumers
   - Feedback collection

5. Operational Integration
   - IOC operationalization
   - Detection rule deployment
   - Hunt hypothesis development

Starting Resources:
- 1-2 analysts (can be partial role)
- TIP platform (open source: OpenCTI, MISP)
- Subscription to key sources
- Access to internal data
- Executive sponsorship

Measuring Intelligence Value:

Intelligence Program Metrics:

Activity Metrics (Output):
- Reports produced
- Indicators shared
- Requests fulfilled
- Hunts conducted

Quality Metrics (Effectiveness):
- Accuracy of assessments
- Timeliness of warnings
- Consumer satisfaction
- Detection rate improvement

Business Metrics (Value):
- Incidents prevented/detected earlier
- Response time reduction
- False positive reduction
- Cost avoidance

Example Measurement:
"Intelligence-driven detections identified 3 attacks
that would have been missed by signature-based tools,
preventing an estimated $2M in potential damage and
reducing mean time to detect by 72%."

Challenges:
- Proving negatives (attacks prevented)
- Attribution of detection to intelligence
- Quantifying context value
- Long-term vs. short-term metrics

Key insight: Start small and demonstrate value before expanding. One analyst delivering actionable intelligence is worth more than a large team drowning in data.

Real-World Context

Case Study: SolarWinds Supply Chain Attack

The SolarWinds attack (2020) demonstrated intelligence value at multiple levels: Tactical intelligence identified specific IOCs (SUNBURST malware hashes, C2 domains using .avsvmcloud.com pattern) enabling immediate blocking. Operational intelligence revealed the attack chain—compromised build system, trojanized update, delayed execution, sophisticated C2—enabling hunt teams to find affected systems. Strategic intelligence connected the campaign to Russian intelligence services (APT29/Cozy Bear), informed geopolitical context, and shaped long-term supply chain security investments. Organizations with mature intelligence programs detected and responded faster than those relying solely on vendor notifications.

Case Study: Ransomware Intelligence

A healthcare organization subscribed to an industry ISAC and monitored ransomware trends. Intelligence indicated that the Ryuk ransomware group was actively targeting hospitals during COVID-19. The intelligence included: TTPs (Emotet → TrickBot → Ryuk chain), timing patterns (attacks on weekends), and initial access methods (phishing with document macros). Armed with this intelligence, the organization enhanced email filtering, deployed specific detections for the attack chain, and increased monitoring during weekends. When a phishing email matching the pattern arrived, it was detected and blocked before execution—an attack prevented by intelligence.

Intelligence Impact Framework:

Levels of Intelligence Impact:

BLOCKING (Immediate):
- Deploy IOCs to firewalls/EDR
- Block known malicious indicators
- Immediate, measurable impact

DETECTING (Short-term):
- Develop detection rules from TTPs
- Hunt for adversary techniques
- Improve detection coverage

UNDERSTANDING (Medium-term):
- Profile adversary behavior
- Anticipate likely attacks
- Prepare response playbooks

STRATEGIZING (Long-term):
- Shape security investments
- Inform risk assessments
- Guide architecture decisions

Most Valuable Intelligence:
- Changes behavior or decisions
- Prevents or detects attacks
- Saves resources or reduces risk
- Enables proactive action

Intelligence value is measured in decisions enabled and outcomes improved—not in reports produced or indicators collected.

Guided Lab: Intelligence Source Evaluation

In this lab, you'll explore threat intelligence sources, evaluate their utility, and practice distinguishing data from actionable intelligence.

Lab Environment:

  • Web browser with access to public intelligence sources
  • Sample threat report (provided or from CISA)
  • Spreadsheet for source evaluation

Exercise Steps:

  1. Access three different threat intelligence sources (e.g., CISA, OTX, vendor blog)
  2. Find a recent threat report or advisory from each
  3. Identify what intelligence type each provides (tactical/operational/strategic)
  4. Extract specific IOCs and contextual information
  5. Evaluate each source using the Admiralty System
  6. Determine how the intelligence could be used operationally
  7. Document gaps in the intelligence provided

Reflection Questions:

  • Which source provided the most actionable intelligence?
  • What additional context would improve the intelligence?
  • How would you validate the accuracy of this intelligence?

Week Outcome Check

By the end of this week, you should be able to:

  • Define threat intelligence and distinguish it from raw data
  • Explain the intelligence hierarchy (data → information → intelligence)
  • Identify strategic, operational, and tactical intelligence types
  • Describe how intelligence integrates with security operations
  • Evaluate intelligence sources using structured criteria
  • Explain the components of a threat intelligence program
  • Articulate the business value of threat intelligence
  • Match intelligence products to appropriate consumers

📚 Building on Prior Knowledge

Connect this week to foundational concepts you've already learned:

  • CSY101 Week 13 (Threat Modeling): Use STRIDE to frame actor goals and likely TTPs.
  • CSY101 Week 01 (Risk Communication): Translate intelligence into business impact for stakeholders.
  • CSY104 Week 11 (CVSS/EPSS): Prioritize indicators by likely impact and exploitability.
  • CSY204 (SOC Operations): Feed intel into detection, triage, and response workflows.

🎯 Hands-On Labs (Free & Essential)

Practice turning data into actionable intelligence before moving to reading resources.

🎮 TryHackMe: Threat Intel

What you'll do: Work through threat intelligence fundamentals and IOC handling.
Why it matters: Establishes baseline terminology and workflow.
Time estimate: 1.5-2 hours

Start TryHackMe Threat Intel →

🛰️ AlienVault OTX: Threat Pulse Review

What you'll do: Review a pulse, extract IOCs, and summarize impact.
Why it matters: OTX is a common open intel source in real SOCs.
Time estimate: 60-90 minutes

Open AlienVault OTX →

📝 Lab Exercise: Intel Source Scoring

Task: Score three intel sources using the Admiralty System (A-F, 1-6).
Deliverable: Source table with confidence ratings and use cases.
Why it matters: Credibility assessment prevents bad decisions.
Time estimate: 60-90 minutes

🧩 Lab: Supply Chain Incident Snapshot

What you'll do: Summarize a supply chain breach (SolarWinds, 3CX, or MOVEit).
Deliverable: One-page brief with timeline, impacted parties, and intel gaps.
Why it matters: Supply chain incidents reshape risk priorities fast.
Time estimate: 60-90 minutes

💡 Lab Tip: Always separate indicator validity from source credibility in your notes.

🧩 Supply Chain Threat Intelligence

Modern attackers target vendors, build systems, and dependencies. Threat intel must track third-party risk as a first-class concern.

Supply chain intel focus:
- Vendor exposure and dependency mapping
- Compromise of build systems and CI/CD
- Malicious updates and signed packages
- Third-party access abuse

📚 Building on CSY101 Week-14: Link supplier risk to CIS Controls and ISO 27001 requirements.

Resources

Lab

Complete the following lab exercises to practice fundamental threat intelligence concepts.

Part 1: Intelligence Classification (LO1)

Given a sample threat report, identify and classify: (a) all tactical intelligence (IOCs, hashes, IPs), (b) all operational intelligence (TTPs, campaign details), (c) all strategic intelligence (adversary motivation, trends). Document each element with its classification rationale.

Deliverable: Classified intelligence breakdown table with examples from the report.

Part 2: Source Comparison (LO1)

Access three different intelligence sources covering the same threat (e.g., a recent ransomware campaign). Compare: (a) level of detail, (b) timeliness, (c) actionability, (d) context provided. Rate each using the Admiralty System.

Deliverable: Source comparison matrix with ratings and analysis of differences.

Part 3: Consumer Matching (LO1)

Take a comprehensive threat report and create three different summaries appropriate for: (a) SOC analyst (tactical focus), (b) security manager (operational focus), (c) CISO/executive (strategic focus). Each summary should be one paragraph.

Deliverable: Three audience-appropriate summaries of the same threat information.

Part 4: Intelligence Gap Analysis (LO1)

For a hypothetical organization (provided scenario), identify: (a) what intelligence they would need, (b) what sources could provide it, (c) what gaps would likely exist, (d) how they could fill those gaps.

Deliverable: Intelligence requirements and gap analysis document.

Part 5: Value Proposition (LO1)

Write a one-page proposal for starting a threat intelligence program at a mid-sized company. Include: (a) business case, (b) required resources, (c) expected outcomes, (d) success metrics.

Deliverable: Executive proposal for threat intelligence program initiation.

Week 01 Quiz

Test your understanding of Threat Intelligence Fundamentals.

Format: 10 multiple-choice questions. Passing score: 70%. Time: Untimed.

Take Quiz

Checkpoint Questions

  1. What is the difference between threat data, threat information, and threat intelligence? Provide an example of each using the same malware sample.
  2. Explain the three levels of threat intelligence (tactical, operational, strategic) and identify appropriate consumers for each.
  3. Why is internal data (logs, incidents) considered the most relevant source of threat intelligence for an organization?
  4. Describe how threat intelligence should integrate with security operations. Give three specific examples.
  5. What criteria would you use to evaluate a new threat intelligence source? How does the Admiralty System help?
  6. How would you measure the value of a threat intelligence program? What metrics would demonstrate ROI?

Weekly Reflection

Threat intelligence transforms how organizations approach security—moving from reactive response to proactive preparation. This week introduced the foundations that enable this transformation.

Reflect on the following in 200-300 words:

A strong reflection demonstrates understanding of intelligence as a capability beyond data collection, and articulates how intelligence enables better security decisions.

Verified Resources & Videos

← Back to Overview Next: Week 02 →