
Introduction to the cyber threat intelligence and different levels of threat intelligence

Expert insights on CTI frameworks and methodologies

A detailed walkthrough of each step of CTI cycle

Tips on how to centralize the access to disparate data sources

A guide to how to set up Maltego to jump start the CTI investigation

A step-by-step playbook of five most common CTI investigations