1. Basics of Threat Analysis and Modeling
  2. Formulate a Threat Intelligence Model
  3. Adversary Data Collection Sources & Methods
  4. Pivot Off and Extracting Adversarial Data
  5. Primary Indicators of Security Compromise
  6. Identify & Build Indicators of Compromise
  7. Conduct Threat Assessments In Depth
  8. Produce Heat Maps, Infographics & Dashboards
  9. Build Reliable & Robust Threat Intelligence System
  10. Learn Statistical Approaches for Threat Intelligence
  11. Develop Analytical Skills for Complex Threat
  12. Planning for Disaster