Cybersecurity Threat Intelligence

Cybersecurity Threat Intelligence


IBM Training for Cybersecurity Threat Intelligence

Skill Level: Basic

Modality:  WBT - Web Based Training - Self Paced

Duration: 3.7 Day/s

Starting Price:  $ - 850


This course gives you the background needed to understand basic Cybersecurity from the history to an overview of cybersecurity tools.

This course covers threat intelligence sources. You will learn about data protection risks and explore mobile endpoint protection. Finally, you will recognize various scanning technologies, application security vulnerabilities, and threat intelligence platforms.This course is intended for anyone who wants to gain a basic understanding of cybersecurity. This is the sixth course in a series to acquire the skills to work in the field as a Cybersecurity Analyst.

Request a Quote

Please enable JavaScript in your browser to complete this form.
Multiple Choice
How did you hear about us?
Yes, I would like to receive special offers from CRS.
Yes, I would like to receive special offers from CRS.

Target Audience:

Anyone who wants to gain a basic understanding of Cybersecurity or as the sixth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Cybersecurity Analyst..


Prerequisites: None.

Topic: Unit 1:  Threat IntelligenceUnit 2:  Data Loss Prevention and Mobile Endpoint ProtectionUnit 3:  ScanningUnit 4:  Application Security and TestingUnit 5:  SIEM PlatformsUnit 6:  Threat Hunting.

IBM Training

Objective: In this course you will learn to:Describe cybersecurity trends, drivers, and threats

  • List the various costs of a cybersecurity breach
  • Identify threat intelligence external sources
  • Describe each step in the threat intelligence strategy map
  • List key publications to review for insights into strategic threat intelligence plans
  • Describe various threat intelligence platforms and resources
  • Explain how to use various cyberthreat frameworks
  • List best practices for intelligent detection of threats
  • Define security intelligence
  • Identify the three pillars of effective threat detection
  • Explain the importance of improving security effectiveness
  • Define data protection and security and explain its purpose
  • Describe common data security challenges
  • Discuss common pitfalls in data security
  • Identify industry-specific data security challenges
  • Identify the 12 critical capabilities for a data protection solution
  • Describe Guardium as an example of a data protection solution
  • Describe the primary vulnerabilities of mobile endpoints
  • Discuss the available security options for mobile endpoints
  • Explain day-to-day mobile endpoint management
  • Manage mobile endpoint security using IBM MaaS360
  • Explain how vulnerability scanners work
  • Describe how vulnerability scanners are used
  • Explain how to use the Common Vulnerability Scoring System (CVSS) to assign vulnerability scores
  • Explain the use of the Security Technical Implementation Guide to enhance the overall security posture
  • Explain how to use the Center for Internet Security (CIS) Benchmark hardening/vulnerability checklists
  • Describe port scanning
  • Describe the information gained from port scanning
  • Describe the Nmap and Zenmap port scanning applications
  • Explain what network protocol analyzers are
  • Describe Wireshark
  • Describe the packet capture file format
  • Identify the characteristics of a security architecture
  • Describe the different types of high-level security architectural models
  • Describe how to decompose solutions to identify threats and specify security controls
  • Explain how to use security patterns to accelerate security development for infrastructure and applications
  • Describe the pros and cons of various software development lifecycles
  • Describe application security techniques and tools
  • Discuss application threats and attacks
  • Summarize the OWASP top 10 application security risks
  • Describe security standards and regulations
  • Explain DevSecOps and its effect on application security
  • Explain how to write secure application code
  • Define cross-site scripting and describe its dangers
  • Explain how to defend against cross-site scripting
  • Define the key terms for security information event management (SIEM)
  • Explore the role of SIEM in networks and moderate security operation centers
  • Describe key considerations for deploying a SIEM system
  • Discuss different SIEM solutions and their components
  • Explain the features of QRadar for security analysis
  • Analyze and report on cybersecurity events using IBM QRadar SIEM
  • Investigate user behavior using the IBM QRadar User Behavior Analytics app (UBA)
  • Describe use cases for UBA
  • List the advantages of an integrated UBA solution in a security operation center (SOC)
  • List the challenges that SOCs face
  • Explain the benefits of artificial intelligence (AI) for cyberanalysts
  • Describe the features and functions of an industry example using QRadar Advisor with Watson
  • Investigate cybersecurity events using QRadar Advisor with Watson
  • Discuss global cyber trends and challenges
  • Explain why SOCs need to perform threat hunting
  • Explain the primary goal of SOC cyber threat hunting
  • Apply the cyber threat hunting concepts to an industry example
  • Describe the structure of a cyber threat hunting team
  • Examine cyber threat hunting with i2 use case examples
  • Investigate cybersecurity threats using QRadar Analyst Workflow
  • Category: Security


    Product Name:

    IBM Security Education


    Badge and Certification Info:

    Badge Title: Cybersecurity Threat Intelligence

    Badge ID: 5ed1a89c-d37a-44d0-8ab0-ccab41b761dc


    Brand: IBM Security


    IBM Training is available now.

    Cyber Retaliator Solutions (CRS) is a Cyber Security Distributor, Authorized IBM Training Center, Red Hat and SUSE Training Partner, and a CompTIA Training Delivery Partner, operating throughout the Globe. Our Head Office is in Centurion South Africa, with IBM Training Centers in Centurion, Midrand, Sandton, Cape Town, California CA, Florida FL, New York NY, Washington DC, Georgia GA, Texas TX.


    CRS is the Top Global Training Provider for some of the world's biggest brands.

    Authorized Training delivered to you by the global leader in IBM Training.


    Select courses in:

    IBM Cloud


    IBM Automation

    IBM Rational


    IBM Tivoli

    IBM Systems


    IBM Storage


    IBM Security

    System Z

    IBM Industry

    IBM Asset Management


    IBM Data and AI

    Get the Best IBM Training from CRS. As an IBM Training Provider, we've partnered with IBM through Arrow ECS to deliver training that covers the full portfolio of IBM systems and software.

    Authorized IBM Training

    RedHat Training

    SUSE Training

    Agile SAFe Training

    Cyber Awareness Training

    Cyber Security

    Get the Best IBM Training from CRS. As an IBM Training Provider, we've partnered with IBM through Arrow ECS to deliver training that covers the full portfolio of IBM systems and software.


    Authorized IBM Training
    RedHat Training
    SUSE Training
    Cyber Awareness Training
    Agile SAFe Training
    Cyber Security



    CRS offers

    IBM Training


    IBM Certification Training


    The United States of America

    with locations:

    4700 Millenia Blvd., Orlando, Florida 32839

    250 Park Avenue, New York, New York 10177

    4900 California Avenue, Tower B, Bakersfield, California 93309

    1300 I Street NW, Washington, District of Columbia 20005

    235 W Roosevelt Ave, Albany, Georgia 31701

    4400 Buffalo Gap Rd., Abilene, Texas 79606



    Follow CRS:


    Follow on Courses:

    Replaced By: 

    8H151 8H150 cyber security cybersecurity system analyst data loss prevention vulnerability scanning application security

    The price on this page are indicative. Please contact CRS via the above form to confirm pricing.

    Call Now +27 12 023 1959