top of page
shutterstock_1909492885.jpg

Cyber Intelligence

This course will not be your traditional classroom course. The teaching will be centered on three workshops.

The course is a part of the experience based master and will therefore aim to build on your professional background and experience. We expect you to contribute with your own experiences and to apply the theory to your own professional practice. The assignment will focus on applying cyber intelligence to a case, preferable based on your organization and/or experience.

 

The intelligence lifecycle (general methodology) - Planning, building a collection plan - Collection - Processing - Produce - Disseminate -Cyber Intelligence (specific methodology) -Closed-, Open- and Multi-Source Intelligence -Threat actor attribution and analysis -The diamond model -Cyber Defense Kill-Chain -Threat hunting -Information sharing (Tactics, Techniques and Procedures) -Cyber Situation Awareness (Cyber intelligence products)

bottom of page