Advanced Threat Intelligence Techniques (ATI) teaches cybersecurity professionals how to produce defensible, decision-relevant threat intelligence in real operational environments. Rather than focusing on tools alone, the course emphasizes intelligence tradecraft, guiding learners through problem framing, intelligence requirements, disciplined collection, and structured cyber threat analysis.

您将学到什么
Analyze threat intelligence by defining requirements, applying frameworks, and modeling adversaries to produce decision-relevant intelligence.
Apply collection and processing to gather, filter, and normalize threat data from multiple sources while accounting for quality, bias, and relevance.
Evaluate adversary behavior and attribution by applying analytic techniques, mapping TTPs to frameworks, and communicating confidence levels.
Create threat intelligence outcomes by integrating into defensive workflows, evaluating effectiveness, and applying AI capabilities responsibly.
要了解的详细信息

添加到您的领英档案
March 2026
4 项作业
了解顶级公司的员工如何掌握热门技能

该课程共有4个模块
This module establishes the foundational tradecraft of threat intelligence by defining intelligence as a decision-enabling discipline, not a collection of data or tools. Learners explore how intelligence requirements are shaped, how analytic frameworks support structured thinking, and why modeling adversaries and systems is essential for producing actionable insight. Emphasis is placed on analytic rigor, stakeholder alignment, and managing uncertainty—skills that separate mature intelligence programs from reactive reporting functions. By the end of this module, learners will understand how to structure intelligence problems that support real operational and strategic decisions.
涵盖的内容
11个视频2篇阅读材料1个作业1次同伴评审2个讨论话题
This module focuses on how threat intelligence teams collect, process, and normalize data in ways that support analytic judgment rather than overwhelm it. Learners examine open-source intelligence, malware-derived data, and large-scale datasets, with emphasis on source evaluation, signal filtering, and bias management. The module highlights the tradeoffs between speed, depth, and reliability, and demonstrates how improper processing can distort downstream analysis. By the end of this module, learners will understand how disciplined collection and processing create the conditions for credible intelligence assessment.
涵盖的内容
10个视频1篇阅读材料1个作业1次同伴评审1个讨论话题
This module focuses on how threat intelligence teams analyze collected data and assess attribution with discipline and confidence. Learners apply structured analytic techniques to evaluate adversary behaviour, map TTPs, and distinguish evidence from assumptions. The module emphasizes probabilistic reasoning, confidence levels, and analytic transparency—particularly where attribution carries operational or strategic risk. By the end of this module, learners will be able to produce defensible intelligence judgments that withstand scrutiny from both technical and executive stakeholders.
涵盖的内容
10个视频1篇阅读材料1个作业1次同伴评审2个讨论话题
This module focuses on turning threat intelligence into measurable, operational impact across detection, response, and decision-making workflows. Learners examine how intelligence informs threat hunting, defensive architecture, and program governance while navigating legal, ethical, and organizational constraints. The module emphasizes effectiveness over activity, teaching learners how to measure success, identify gaps, and communicate value to stakeholders. By the end of this module, learners will be prepared to integrate intelligence into real operational environments and continuously evolve their intelligence programs.
涵盖的内容
11个视频1篇阅读材料1个作业2次同伴评审1个讨论话题
提供方
从 Computer Security and Networks 浏览更多内容
状态:预览
状态:预览Starweaver
状态:预览Starweaver
状态:免费试用
人们为什么选择 Coursera 来帮助自己实现职业发展

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.
常见问题
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
更多问题
提供助学金,





