CYBR 645 Cyber Threat Hunting and Intelligence
In an era of sophisticated cyber threats, organizations rely on proactive threat intelligence and hunting strategies to defend against advanced network intrusions and data breaches. This course equips students with the knowledge and practical skills to collect, analyze, and apply Cyber Threat Intelligence (CTI) at tactical, operational, and strategic levels to enhance cyber threat-hunting operations and defensive cybersecurity mechanisms. Students will evaluate cyber threat intelligence frameworks, including MITRE ATT&CK, to identify adversary tactics, techniques, and procedures (TTPs) and detect advanced cyber threats. The course covers correlating Indicators of Compromise (IoCs) from multiple intelligence sources, including Open-Source Intelligence (OSINT), to strengthen proactive threat detection and response. Emphasis is placed on implementing intelligence-sharing frameworks and protocols to facilitate active cyber defense through threat-hunting and coordinated threat mitigation. Additionally, students will explore ethical considerations in cyber intelligence, ensuring compliance with legal, policy, and organizational standards when collecting, analyzing, and disseminating intelligence. By the end of this course, students will have the expertise to leverage cyber threat intelligence for proactive security measures, enhancing organizational resilience against evolving cyber threats.
First day attendance is mandatory.
Prerequisites: Graduate standing. Note: Students are responsible to both be aware of and abide by prerequisites for CYBR courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
Prerequisites
Special information
Prerequisites: Graduate standing. Note: Students are responsible to both be aware of and abide by prerequisites for CYBR courses for which they enroll, and will be administratively dropped from a course if they have not met prerequisites.
2 Graduate credits
Effective May 6, 2020 to present
Learning outcomes
General
- Evaluate the key characteristics, value, and benefits of Cyber Threat Intelligence (CTI) across tactical, operational, and strategic levels to enhance cybersecurity defense mechanisms.
- Analyze and apply cyber threat intelligence models and frameworks, including MITRE ATT&CK, to identify adversary tactics, techniques, and procedures (TTPs) and detect sophisticated attacks.
- Interpret and analyze Indicators of Compromise (IoCs) from multiple intelligence sources, including open-source intelligence (OSINT), to strengthen proactive threat detection and response.
- Use and apply threat intelligence-sharing frameworks and protocols to facilitate active cyber defense, ensuring timely and effective threat mitigation through threat hunting.
- Demonstrate and justify ethical intelligence collection, analysis, and dissemination practices, ensuring compliance with legal, policy, and organizational standards.
Summer 2025
Section | Title | Instructor | books | eservices |
---|---|---|---|---|
50 | Cyber Threat Hunting and Intelligence | Peeler, Vincent | Books for CYBR-645-50 Summer 2025 | Course details for CYBR-645-50 Summer 2025 |