Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

FOR578: Cyber Threat Intelligence

FOR578Digital Forensics and Incident Response
  • 6 Days (Instructor-Led)
  • 36 Hours (Self-Paced)
Course created by:
Rebekah BrownRobert M. Lee
Rebekah Brown & Robert M. Lee
FOR578: Cyber Threat Intelligence
Course created by:
Rebekah BrownRobert M. Lee
Rebekah Brown & Robert M. Lee
  • GIAC Cyber Threat Intelligence (GCTI)
  • 36 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Intermediate Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 20 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Master tactical, operational, and strategic cyber threat intelligence skills. Improve analytic processes and incident response effectiveness to support your detection and response programs.

Course Overview

Cyber threat intelligence training is essential for countering today’s flexible, persistent human threats and targeted attacks. In FOR578 Cyber Threat Intelligence™, you’ll learn to assess complex scenarios and develop skills in tactical, operational, and strategic-level threat intelligence. This course empowers you to expand your existing knowledge and establish new best practices for security teams.

What You’ll Learn

  • Develop advanced analysis skills for complex scenarios
  • Master intelligence requirements gathering (e.g., threat modeling)
  • Understand threat intelligence at all levels (tactical, operational, strategic)
  • Generate actionable threat intelligence for threat detection and response
  • Become proficient in adversary data collection and exploitation
  • Validate intelligence sources and create high-fidelity IOCs (e.g., YARA, STIX/TAXII)
  • Understand and leverage analytic models (e.g., Kill Chain, Diamond Model, MITRE ATT&CK) across all security roles

Business Takeaways:

  • Understand the everchanging cyber threat landscape and what it means for your organization
  • Practice analytic techniques to inform key business leaders on how to most effectively defend themselves and the organization against targeted threats
  • Identify cost-effective ways of leveraging open-source and community threat intelligence tools, along with familiarity with some of the most impactful commercial tools available.
  • Effectively communicate threat intelligence at tactical, operational, and strategic levels
  • Become a force multiplier for other core business functions, including security operations, incident response, and business operations.

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in FOR578: Cyber Threat Intelligence.

Section 1Cyber Threat Intelligence and Requirements

This section introduces students to the most important concepts of intelligence, analysis tradecraft, and levels of threat intelligence, as well as the value they can add to organizations.

Topics covered

  • Intelligence Cycle, Tradecraft, and Analytical Techniques
  • Cyber Threat Definitions, Risk, Actors, and Threat Models
  • Threat Intelligence Collection & Generation

Labs

  • Using Structured Analytical Techniques
  • Enriching and Understanding Limitations
  • Strategic Threat Modeling

Section 2The Fundamental Skillset: Intrusion Analysis

In this section, students will be walked through and participate in multi-phase intrusions from initial notification of adversary activity to the completion of analysis of the event. The section also highlights the importance of this process in terms of structuring and defining adversary campaigns.

Topics covered

  • Intrusion Analysis
  • Kill Chain Deep Dive
  • Handling Multiple Kill Chains

Labs

  • Collecting Indicators from Reconnaissance and Delivery
  • Pivoting to Network Data with Indicators
  • Pivoting to Memory with Indicators

Section 3Collection Sources

In this section students will learn to seek and exploit information from domains, external datasets, malware, Transport Layer Security/Secure Sockets Layer (TLS/SSL) Certificates, and more. Students will also structure the data to be exploited for purposes of sharing internally and externally.

Topics covered

  • Case Studies: HEXANE, GlassRAT, Trickbots
  • Malware
  • Domains

Labs

  • Aggregating and Pivoting in Excel with Malware Samples
  • Open-Source Intelligence and Domain Pivoting in DomainTools
  • Maltego Pivoting and Open-Source Intelligence

Section 4Analysis and Production of Intelligence

In this section students will learn how to structure and store their information over the long term using tools such as MISP; how to leverage analytical tools to identify logical fallacies and cognitive biases; how to perform structured analytic techniques in groups such as analysis of competing hypotheses; and how to cluster intrusions into threat groups.

Topics covered

  • Human-Operated Ransomware
  • Storing and Structuring Data
  • Logical Fallacies and Cognitive Biases

Labs

  • Storing Threat Data in MISP
  • Identifying Types of Biases
  • Analysis of Competing Hypotheses

Section 5Dissemination and Attribution

Intelligence is useless if not disseminated and made useful to the consumer. In this section students will learn about dissemination at the various tactical, operational, and strategic levels.

Topics covered

  • Logical Fallacies and Cognitive Biases
  • Tactical Dissemination
  • Operational Dissemination

Labs

  • Developing IOCs in YARA
  • Working with STIX
  • Building a Campaign Heatmap

Section 6Capstone

The FOR578 capstone focuses on analysis. Students will be placed on teams, given outputs of technical tools and cases, and work to piece together the relevant information from a single intrusion that enables them to unravel a broader campaign.

Things You Need To Know

Relevant Job Roles

Data Analysis (OPM 422)

NICE: Implementation and Operation

Responsible for analyzing data from multiple disparate sources to provide cybersecurity and privacy insight. Designs and implements custom algorithms, workflow processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes.

Explore learning path

Threat Hunter

Digital Forensics and Incident Response

This expert applies new threat intelligence against existing evidence to identify attackers that have slipped through real-time detection mechanisms. The practice of threat hunting requires several skill sets, including threat intelligence, system and network forensics, and investigative development processes. This role transitions incident response from a purely reactive investigative process to a proactive one, uncovering adversaries or their footprints based on developing intelligence.

Explore learning path

All-Source Analyst (DCWF 111)

DoD 8140: Intelligence (Cyberspace)

Analyzes data from multiple sources to prepare environments, respond to information requests, and support intelligence planning and collection requirements.

Explore learning path

Threat Analysis (OPM 141)

NICE: Protection and Defense

Responsible for collecting, processing, analyzing, and disseminating cybersecurity threat assessments. Develops cybersecurity indicators to maintain awareness of the status of the highly dynamic operating environment.

Explore learning path

All-Source Collection Manager (DCWF 311)

DoD 8140: Intelligence (Cyberspace)

Identifies collection priorities, develops plans using available assets, and monitors execution to meet operational intelligence requirements.

Explore learning path

OSINT Investigator/Analyst

Cyber Defense

These resourceful professionals gather requirements from their customers and then, using open sources and mostly resources on the internet, collect data relevant to their investigation. They may research domains and IP addresses, businesses, people, issues, financial transactions, and other targets in their work. Their goals are to gather, analyze, and report their objective findings to their clients so that the clients might gain insight on a topic or issue prior to acting.

Explore learning path

Insider Threat Analysis

NICE: Protection and Defense

Responsible for identifying and assessing the capabilities and activities of cybersecurity insider threats; produces findings to help initialize and support law enforcement and counterintelligence activities and investigations.

Explore learning path

Military Operations / Law Enforcement Agents

Digital Forensics and Incident Response

Execute digital forensic operations under demanding conditions, rapidly extracting critical intelligence from diverse devices. Leverage advanced threat hunting and malware analysis skills to neutralize sophisticated cyber adversaries.

Explore learning path

Incident Response Team Member

Digital Forensics and Incident Response

This dynamic and fast-paced role involves identifying, mitigating, and eradicating attackers while their operations are still unfolding.

Explore learning path

Defensive Cybersecurity (OPM 511)

NICE: Protection and Defense

Responsible for analyzing data collected from various cybersecurity defense tools to mitigate risks.

Explore learning path

Cybersecurity Analyst / Engineer

Cyber Defense

As this is one of the highest-paid jobs in the field, the skills required to master the responsibilities involved are advanced. You must be highly competent in threat detection, threat analysis, and threat protection. This is a vital role in preserving the security and integrity of an organization’s data.

Explore learning path

Incident Response (OPM 531)

NICE: Protection and Defense

Responsible for investigating, analyzing, and responding to network cybersecurity incidents.

Explore learning path

Digital Evidence Analysis (OPM 211)

NICE: Investigation

Responsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Robert M. Lee
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by Andreas Sfakianakis
    Date & Time
    Fetching schedule..View event details
    Course price
    £7,160 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by Peter Szczepankiewicz
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Salt Lake City, UT, US & Virtual (live)

    Instructed by John Doyle
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    San Antonio, TX, US & Virtual (live)

    Instructed by Kevin Ripa
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Melbourne, VIC, AU & Virtual (live)

    Instructed by Justin Parker
    Date & Time
    Fetching schedule..View event details
    Course price
    A$13,350 AUD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Melbourne, VIC, AU & Virtual (live)

    Date & Time
    Fetching schedule..View event details
    Course price
    A$13,350 AUD
    Enrollment options
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by Andreas Sfakianakis
    Date & Time
    Fetching schedule..View event details
    Course price
    €8,230 EUR*Prices exclude applicable local taxes
    Enrollment options
Showing 8 of 33

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources