Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Advanced Strategic Threat Intelligence Research & Reporting

Starweaver via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
In this course, you will dive into the core aspects of threat intelligence, learning to identify and analyze a wide range of cyber threats such as ransomware, identity theft, and business email compromise. The course is designed for intermediate learners and covers intelligence collection methodologies like OSINT, HUMINT, and SIGINT, helping you gain expertise in understanding the tactics, techniques, and procedures (TTPs) of adversaries. You’ll explore threat actor landscapes and gain insights into advanced persistent threat (APT) campaigns, using frameworks like MITRE ATT&CK and applying NIST 800-53 security controls to protect both business assets and personal data. Along with technical analysis, you’ll develop key communication skills to present your findings effectively to both technical teams and non-technical stakeholders, including executives and decision-makers. The course emphasizes report-writing and oral presentations, teaching you to communicate complex intelligence clearly and persuasively. You will leave with the skills to transform threat data into actionable intelligence, enabling you to make informed decisions and drive security initiatives that protect organizations from evolving cyber risks. This course is ideal for IT and cybersecurity professionals looking to elevate their skills in threat detection, incident response, and security architecture. It also caters to Chief Information Security Officers (CISOs) and security leaders aiming to update their strategies for managing evolving threats. Business executives, including CEOs and other senior leaders, will benefit from understanding cybersecurity risks and compliance, while cybersecurity analysts seeking advanced investigative and analytical techniques will find this course essential for career growth. To get the most out of this course, participants should have a beginner-level understanding of IT or cybersecurity, along with familiarity in basic networking and security concepts. While certifications like A+, Network+, or Security+ are helpful, they are not mandatory for enrollment. The course is designed to build on foundational knowledge, making it accessible to those with some prior experience in the field. By the end of this course, learners will be able to differentiate between data, intelligence, and threats, and identify reliable sources for threat data collection. They will also learn to apply intelligence collection methodologies to analyze and correlate threat data, evaluate threats across multiple sources, and conduct risk assessments. Additionally, learners will be able to craft strategic intelligence reports tailored to different audiences, effectively communicating complex findings through data storytelling techniques.

Syllabus

  • Course Introduction
    • In this course, you’ll learn how to identify, analyze, and respond to evolving cyber threats. You’ll focus on advanced threat intelligence techniques, including data collection, analysis of threat actors, and malware correlation, using frameworks like MITRE ATT&CK and NIST 800-53. Through expert instruction, real-world case studies, and hands-on exercises, you’ll gain the skills to interpret intelligence from multiple sources, assess risks, and develop strategic reports. By the end of this course, you’ll be equipped to protect your organization from cyber threats, effectively communicate findings, and lead proactive defense initiatives across your business.
  • Introduction to Threat Intelligence
    • In this module, you’ll learn how to embed security directly into your applications and development processes. You’ll explore Secure by Design principles, secure coding techniques, and secure configuration practices to prevent critical vulnerabilities. Through practical demonstrations, static and dynamic application security testing, and runtime protection strategies, you’ll develop the skills to identify, mitigate, and manage vulnerabilities throughout the software development lifecycle. This module emphasizes proactive security practices aligned with industry standards such as OWASP Top 10 and SANS Top 25 to ensure robust, production-ready applications.
  • Strategic Analysis, Attribution & Threat Modelling
    • In this module, you’ll learn how to analyze, attribute, and model cyber threats using structured, evidence-based intelligence techniques. You’ll work with methods like ACH, red teaming, and scenario modeling to evaluate adversary behavior, identify analytical biases, and communicate confidence levels clearly. You’ll also build strategic threat models using frameworks such as STRIDE, ATT&CK, and NIST 800-30, ensuring your assessments align with real organizational risk. By focusing on rigorous analysis and defensible reasoning, this module prepares you to produce reliable intelligence that supports strong, strategic cybersecurity decisions.
  • Threat Research, Correlation & Infrastructure Mapping
    • In this module, you’ll learn how to perform advanced threat research, correlate complex attack indicators, and map adversary infrastructure across multiple data sources. You’ll explore collection planning, OSINT tradecraft, malware analysis workflows, and behavioral fingerprinting techniques to uncover patterns in threat activity. Through hands-on tools, graph analytics, and real-world case studies, you’ll develop the skills to connect campaigns, identify threat actors, and build accurate intelligence assessments that strengthen attribution and support proactive defense.
  • Reporting and Communication of Intelligence
    • In this module, you’ll learn how to turn complex technical threat intelligence into clear, actionable insights tailored for different audiences across an organization. You’ll practice structuring reports, communicating uncertainty with confidence, and presenting intelligence in formats suited for executives, SOC teams, legal stakeholders, and board members. Through hands-on exercises and real-world examples, you’ll develop the skills to write professional intelligence reports, use visual storytelling, and leverage modern reporting tools to support strategic decision-making and drive meaningful security actions.
  • Course Conclusion
    • In this final module, you’ll apply everything you’ve learned by analyzing a simulated threat actor campaign and turning raw intelligence into a clear, stakeholder-ready brief. You’ll correlate indicators across multiple sources, assess risk and confidence levels, and use structured analysis and reporting techniques to deliver actionable insights that support real-world security decision-making.

Taught by

Monica McIntire and Starweaver

Reviews

Start your review of Advanced Strategic Threat Intelligence Research & Reporting

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.