In today鈥檚 rapidly evolving threat landscape, cyberattacks like ransomware, phishing, and data breaches demand more than reactive defense. This course introduces the fundamentals of Cyber Threat Intelligence (CTI), empowering learners to anticipate threats, analyze adversary behavior, and produce actionable insights that inform security strategy.

Saving 40% on access to 10,000+ programs is a holiday treat. Save now.


Recommended experience
What you'll learn
Explain core principles, types, lifecycle, and role of cyber threat intelligence in defense.
Apply CIA Triad and risk management to turn data into actionable threat insights.
Describe core concepts, functions, and uses of Threat Intelligence Platforms (TIPs).
Use CTI tools to analyze threats, map tactics via MITRE ATT&CK, and plan responses.
Skills you'll gain
- Automation
- Cyber Security Strategy
- Incident Response
- Threat Detection
- Information Assurance
- Vulnerability Assessments
- MITRE ATT&CK Framework
- Threat Management
- Technical Communication
- Threat Modeling
- Cyber Security Assessment
- Risk Management Framework
- Security Information and Event Management (SIEM)
- Cybersecurity
- Data Integrity
- Security Controls
- Endpoint Detection and Response
- Continuous Monitoring
- Cyber Threat Intelligence
- Cyber Threat Hunting
Details to know

Add to your LinkedIn profile
November 2025
See how employees at top companies are mastering in-demand skills

There are 6 modules in this course
In this course, you鈥檒l learn how to transform raw cyber data into actionable intelligence to anticipate, detect, and respond to evolving threats. You鈥檒l explore the full cyber threat intelligence (CTI) lifecycle, from collection and analysis to reporting and application, while using frameworks like MITRE ATT&CK and tools such as SIEM, SOAR, and Threat Intelligence Platforms. Through real-world case studies, hands-on exercises, and guided analysis, you鈥檒l develop the skills to identify attacker tactics, integrate intelligence into security operations, and strengthen your organization鈥檚 defense posture.
What's included
1 video1 reading
In this module, you鈥檒l explore the foundations of Cyber Threat Intelligence (CTI) and its vital role in modern cybersecurity. You鈥檒l discover how CTI transforms raw data into actionable intelligence, examine the differences between data, information, and intelligence, and understand who uses CTI and why. Through real-world examples and an in-depth look at the Threat Intelligence Lifecycle, you鈥檒l learn how organizations gather, analyze, and apply intelligence to defend against evolving cyber threats. This module lays the groundwork for building intelligence-driven security strategies across operational, tactical, and strategic levels.
What's included
10 videos1 reading1 assignment1 peer review1 discussion prompt
In this module, you鈥檒l explore how core information security principles underpin the development and application of Cyber Threat Intelligence (CTI). You鈥檒l examine the CIA Triad鈥擟onfidentiality, Integrity, and Availability鈥攁s the foundation for secure data handling and resilient threat intelligence operations. You鈥檒l also learn how risk management frameworks turn intelligence into action, guiding asset prioritization, vulnerability assessment, and control selection. Through practical applications and real-world examples, you鈥檒l discover how to apply these principles across the CTI lifecycle to ensure intelligence is accurate, timely, and actionable.
What's included
10 videos1 reading1 assignment1 peer review1 discussion prompt
In this module, you鈥檒l gain hands-on experience using Cyber Threat Intelligence (CTI) tools and frameworks to detect, analyze, and respond to cyber threats. You鈥檒l learn to identify Indicators of Compromise (IOCs), map attacker behavior using MITRE ATT&CK, and translate intelligence into clear, actionable response strategies. Through guided simulations and real-world exercises, you鈥檒l build confidence in using CTI to strengthen both proactive defense and incident response operations. By the end, you鈥檒l understand how intelligence-driven actions can minimize risk, reduce response time, and improve overall cyber resilience.
What's included
10 videos1 reading1 assignment1 peer review1 discussion prompt
In this module, you鈥檒l gain hands-on experience using Cyber Threat Intelligence (CTI) tools and frameworks to detect, analyze, and respond to cyber threats. You鈥檒l learn to identify Indicators of Compromise (IOCs), map attacker behavior using MITRE ATT&CK, and translate intelligence into clear, actionable response strategies. Through guided simulations and real-world exercises, you鈥檒l build confidence in using CTI to strengthen both proactive defense and incident response operations.
What's included
10 videos1 reading1 assignment1 peer review1 discussion prompt
In this final module, you鈥檒l bring together everything you鈥檝e learned across the course鈥攆oundations of cyber threat intelligence, information security principles, TIP integrations, and incident response. You鈥檒l apply your skills in a project that challenges you to analyze a real-world cyber incident, identify threat actors, assess malware, and design an actionable intelligence report.
What's included
1 video1 peer review
Offered by
Explore more from Security
Status: Preview
Status: Free TrialJohns Hopkins University

Infosec
Status: Free Trial
Why people choose 糖心vlog官网观看 for their career





Open new doors with 糖心vlog官网观看 Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose 糖心vlog官网观看 for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can鈥檛 afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you鈥檒l find a link to apply on the description page.
More questions
Financial aid available,
鹿 Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with 糖心vlog官网观看's Privacy Notice.




