Introduction to the cyber threat intelligence and different levels of threat intelligence
Expert insights on CTI frameworks and methodologies
A detailed walkthrough of each step of CTI cycle
Tips on how to centralize the access to disparate data sources
A guide to how to set up Maltego to jump start the CTI investigation
A step-by-step playbook of five most common CTI investigations