Open Source Intel-Emerg Threat — Take a deep dive into how to use public sources to recognize and respond to malicious cyber activities. This course will help technical cybersecurity specialists track evolutionary and revolutionary aspects of cybersecurity threats in order to more effectively combat emerging threats. In addition, you will learn how to build and interpret threat models to assist with mitigation activities.
No prereqs
Taught by nobody this semester.