Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Using Evernote as a Threat Intelligence Management Platform - Part 2

via YouTube

Overview

Learn how to leverage Evernote as a powerful threat intelligence management platform in this comprehensive conference talk. Explore the evolving threat intelligence market, understand key requirements, and discover the secret weapon for effective intelligence gathering. Delve into the fundamentals of threat intelligence, sharing methodologies, and case tracking techniques. Gain insights into utilizing open-source tools and OSN sources for enhanced threat detection. Master the art of automating processes, efficient sharing practices, and implementing effective tagging and note-taking strategies. Discover advanced search techniques and explore future developments in the field. Conclude with a summary of key takeaways and establish valuable connections for continued learning and collaboration in the realm of cybersecurity threat intelligence.

Syllabus

Introduction
Disclaimer
How I Started
Threat Intel Market
Requirements
The Secret Weapon
What is Threat Intelligence
Threat Intel Sharing
Case Tracking
Open Source Tools
OSN Sources
Automating
Sharing
Tagging
Notes
Search
Future Work
Summary
Contact

Reviews

Start your review of Using Evernote as a Threat Intelligence Management Platform - Part 2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.