Learning Resources
Recommended Books
Note: The following are affiliate links to Amazon. Purchasing through these links helps support our free training platform.
Quick start guide - Cyber Threat Intelligence
A comprehensive guide to incorporating threat intelligence into incident response processes.
View on Amazon →Intelligence-Driven Incident Response
A comprehensive guide to incorporating threat intelligence into incident response processes.
View on Amazon →The Cuckoo's Egg
A classic true story of tracking a cyber spy, providing insights into early cyber threats.
View on Amazon →Structured Analytical Techniques for Intelligence Analysis
3rd Edition of Structed analytical Techniques.
View on Amazon →Critical Thinking for Strategic Intelligence
Provides insight into the disciplined research that needs to be done when analyzing massive amounts of data
View on Amazon →Communicating With Intelligence
Communication is the essence of intelligence. Provides intelligence practitioners with a comprehensive and detailed handbook.
View on Amazon →Online Resources
MITRE ATT&CK Framework
Comprehensive knowledge base of adversary tactics and techniques.
Visit Resource →SANS Reading Room
Free research papers and documentation on various security topics.
Visit Resource →AlienVault Open Threat Exchange (OTX)
Community-driven threat intelligence sharing platform.
Visit Resource →Threat Connect Research Roundup
Regular updates on emerging threats and threat intelligence research.
Visit Resource →Community Resources
FIRST
Forum of Incident Response and Security Teams - Global coordination of security incidents.
Visit Resource →CIRCL
Computer Incident Response Center Luxembourg - Threat intelligence sharing and tools.
Visit Resource →CTI League
Global volunteer community of CTI professionals focusing on healthcare sector protection.
Visit Resource →CTI Tools
MISP
Open source threat intelligence platform for gathering, sharing, storing and correlating Indicators of Compromise.
Learn More →TheHive Project
Security incident response platform with threat intelligence capabilities.
Learn More →