Course curriculum

    1. Use case: Risks to your tech stack

    2. Use case: Vulnerabilities

    3. Use case: External Attack Surface Exposure

    4. Use case: Attacks targeted to specific industries

    5. Use case: Threat Actor Activity

    6. Use case: Strategic Intelligence

    7. Use case: Executive Reports

    8. Use case: Combine CTI with Threat Hunting

    9. Practice Exercises

    10. Satisfaction survey

About this course

  • Free
  • 30 minutes of content
  • Certification Exam