Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Coursera

Advanced Threat Intelligence Techniques

Starweaver via Coursera

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Advanced Threat Intelligence Techniques (ATI) teaches cybersecurity professionals how to produce defensible, decision-relevant threat intelligence in real operational environments. Rather than focusing on tools alone, the course emphasizes intelligence tradecraft, guiding learners through problem framing, intelligence requirements, disciplined collection, and structured cyber threat analysis. Learners examine adversary behavior using frameworks such as MITRE ATT&CK, apply adversary modeling and TTP analysis, and evaluate evidence through structured analytic techniques. The course also explores malware analysis, OSINT collection, and methods for conducting careful attribution analysis while managing uncertainty and bias. Designed for SOC analysts, incident responders, threat researchers, and threat hunting teams, ATI demonstrates how intelligence supports operational decision-making. Participants learn how to translate analytic findings into detection improvements, threat hunting hypotheses, and executive communication—while responsibly integrating emerging capabilities such as AI in cybersecurity. By the end of the course, learners will be able to produce threat intelligence assessments that withstand analytic scrutiny and meaningfully influence security operations.

Syllabus

  • Threat Intelligence Fundamentals and Frameworks
    • This module establishes the foundational tradecraft of threat intelligence by defining intelligence as a decision-enabling discipline, not a collection of data or tools. Learners explore how intelligence requirements are shaped, how analytic frameworks support structured thinking, and why modeling adversaries and systems is essential for producing actionable insight. Emphasis is placed on analytic rigor, stakeholder alignment, and managing uncertainty—skills that separate mature intelligence programs from reactive reporting functions. By the end of this module, learners will understand how to structure intelligence problems that support real operational and strategic decisions.
  • Collection and Processing Techniques 
    • This module focuses on how threat intelligence teams collect, process, and normalize data in ways that support analytic judgment rather than overwhelm it. Learners examine open-source intelligence, malware-derived data, and large-scale datasets, with emphasis on source evaluation, signal filtering, and bias management. The module highlights the tradeoffs between speed, depth, and reliability, and demonstrates how improper processing can distort downstream analysis. By the end of this module, learners will understand how disciplined collection and processing create the conditions for credible intelligence assessment.
  • Analysis and Attribution
    • This module focuses on how threat intelligence teams analyze collected data and assess attribution with discipline and confidence. Learners apply structured analytic techniques to evaluate adversary behaviour, map TTPs, and distinguish evidence from assumptions. The module emphasizes probabilistic reasoning, confidence levels, and analytic transparency—particularly where attribution carries operational or strategic risk. By the end of this module, learners will be able to produce defensible intelligence judgments that withstand scrutiny from both technical and executive stakeholders.
  • Operationalizing Threat Intelligence
    • This module focuses on turning threat intelligence into measurable, operational impact across detection, response, and decision-making workflows. Learners examine how intelligence informs threat hunting, defensive architecture, and program governance while navigating legal, ethical, and organizational constraints. The module emphasizes effectiveness over activity, teaching learners how to measure success, identify gaps, and communicate value to stakeholders. By the end of this module, learners will be prepared to integrate intelligence into real operational environments and continuously evolve their intelligence programs.

Taught by

Mark Peters and Hector Sandoval

Reviews

Start your review of Advanced Threat Intelligence Techniques

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.