In today’s rapidly evolving threat landscape, cyberattacks like ransomware, phishing, and data breaches demand more than reactive defense. This course introduces the fundamentals of Cyber Threat Intelligence (CTI), empowering learners to anticipate threats, analyze adversary behavior, and produce actionable insights that inform security strategy.
Grounded in real-world cases and current threat reports, the course draws on frameworks like MITRE ATT&CK and integrates key technologies—SIEM, SOAR, EDR/XDR, Threat Intelligence Platforms, and Attack Surface Management. You’ll learn how CTI fits into the broader cybersecurity ecosystem and how intelligence is operationalized by modern security teams.
Designed for beginners and security professionals alike, the curriculum builds foundational CTI skills before advancing to more complex analysis. Through practical exercises and hands-on tools, you’ll move beyond theory to map intelligence lifecycles, interpret threat data, and strengthen enterprise defense with intelligence-led security practices.
In this course, you’ll learn how to transform raw cyber data into actionable intelligence to anticipate, detect, and respond to evolving threats. You’ll explore the full cyber threat intelligence (CTI) lifecycle, from collection and analysis to reporting and application, while using frameworks like MITRE ATT&CK and tools such as SIEM, SOAR, and Threat Intelligence Platforms. Through real-world case studies, hands-on exercises, and guided analysis, you’ll develop the skills to identify attacker tactics, integrate intelligence into security operations, and strengthen your organization’s defense posture.
What's included
1 video1 reading
Show info about module content
1 video•Total 4 minutes
Intro Video to Course •4 minutes
1 reading•Total 5 minutes
Welcome to the Course: Course Overview•5 minutes
Foundations of Cyber Threat Intelligence
Module 2•2 hours to complete
Module details
In this module, you’ll explore the foundations of Cyber Threat Intelligence (CTI) and its vital role in modern cybersecurity. You’ll discover how CTI transforms raw data into actionable intelligence, examine the differences between data, information, and intelligence, and understand who uses CTI and why. Through real-world examples and an in-depth look at the Threat Intelligence Lifecycle, you’ll learn how organizations gather, analyze, and apply intelligence to defend against evolving cyber threats. This module lays the groundwork for building intelligence-driven security strategies across operational, tactical, and strategic levels.
Foundations of Cyber Threat Intelligence •20 minutes
1 peer review•Total 10 minutes
Hands-On-Learning: Simulated Intel -Navigating the Threat Intelligence Lifecycle •10 minutes
1 discussion prompt•Total 10 minutes
Transforming Raw Data into Actionable Intelligence•10 minutes
Information Security Principles
Module 3•2 hours to complete
Module details
In this module, you’ll explore how core information security principles underpin the development and application of Cyber Threat Intelligence (CTI). You’ll examine the CIA Triad—Confidentiality, Integrity, and Availability—as the foundation for secure data handling and resilient threat intelligence operations. You’ll also learn how risk management frameworks turn intelligence into action, guiding asset prioritization, vulnerability assessment, and control selection. Through practical applications and real-world examples, you’ll discover how to apply these principles across the CTI lifecycle to ensure intelligence is accurate, timely, and actionable.
In this module, you’ll gain hands-on experience using Cyber Threat Intelligence (CTI) tools and frameworks to detect, analyze, and respond to cyber threats. You’ll learn to identify Indicators of Compromise (IOCs), map attacker behavior using MITRE ATT&CK, and translate intelligence into clear, actionable response strategies. Through guided simulations and real-world exercises, you’ll build confidence in using CTI to strengthen both proactive defense and incident response operations. By the end, you’ll understand how intelligence-driven actions can minimize risk, reduce response time, and improve overall cyber resilience.
Hands-On-Learning: TIPs and Tomorrow - Advancing Cyber Defense with Intelligence Platforms •10 minutes
1 discussion prompt•Total 10 minutes
The Role of TIPs in Real-Time Cyber Defense•10 minutes
Cyber Threat Intelligence Tools and Incident Response
Module 5•2 hours to complete
Module details
In this module, you’ll gain hands-on experience using Cyber Threat Intelligence (CTI) tools and frameworks to detect, analyze, and respond to cyber threats. You’ll learn to identify Indicators of Compromise (IOCs), map attacker behavior using MITRE ATT&CK, and translate intelligence into clear, actionable response strategies. Through guided simulations and real-world exercises, you’ll build confidence in using CTI to strengthen both proactive defense and incident response operations.
Mapping Threat Indicators to ATT&CK TTPs •9 minutes
Using ATT&CK for Detection and Response •8 minutes
Simulating a Cyber Incident: Scenario Setup •6 minutes
Identifying IOCs and Profiling Threat Actors •11 minutes
Recommending and Communicating Response Actions •9 minutes
1 reading•Total 5 minutes
Strengthening Cyber Defense with MISP•5 minutes
1 assignment•Total 20 minutes
Cyber Threat Intelligence Tools and Incident Response •20 minutes
1 peer review•Total 10 minutes
Hands-On-Learning: Bridging the Gap: Translating Threat Intelligence into Targeted Response Plans •10 minutes
1 discussion prompt•Total 10 minutes
Mapping IOCs to MITRE ATT&CK Techniques in Real-World Incidents•10 minutes
Course Conclusion
Module 6•1 hour to complete
Module details
In this final module, you’ll bring together everything you’ve learned across the course—foundations of cyber threat intelligence, information security principles, TIP integrations, and incident response. You’ll apply your skills in a project that challenges you to analyze a real-world cyber incident, identify threat actors, assess malware, and design an actionable intelligence report.
What's included
1 video1 peer review
Show info about module content
1 video•Total 3 minutes
Course Wrap-Up•3 minutes
1 peer review•Total 60 minutes
Project: Full-Spectrum Threat Response - Profiling, Analysis, and Action Under Pressure •60 minutes
Our purpose at Starweaver is to empower individuals and organizations with practical knowledge and skills for a rapidly transforming world. By collaborating with an extensive, global network of proven expert educators, we deliver engaging, information-rich learning experiences that work to revolutionize lives and careers. Committed to our belief that people are the most valuable asset, we focus on building capabilities to navigate ever evolving challenges in technology, business, and design.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I purchase the Certificate?
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.