In this course, you will dive into the core aspects of threat intelligence, learning to identify and analyze a wide range of cyber threats such as ransomware, identity theft, and business email compromise. The course is designed for intermediate learners and covers intelligence collection methodologies like OSINT, HUMINT, and SIGINT, helping you gain expertise in understanding the tactics, techniques, and procedures (TTPs) of adversaries. You’ll explore threat actor landscapes and gain insights into advanced persistent threat (APT) campaigns, using frameworks like MITRE ATT&CK and applying NIST 800-53 security controls to protect both business assets and personal data.



Advanced Strategic Threat Intelligence Research & Reporting


Instructeurs : Monica McIntire
Inclus avec
Expérience recommandée
Ce que vous apprendrez
Differentiate between data, intelligence, threats, and threat impacts, and identify reliable sources for threat data collection.
Apply intelligence collection methods to analyze threat infrastructure and correlate malware data for validation.
Evaluate intelligence across multiple sources, conduct risk assessments to identify and prioritize threats to enterprise infrastructure.
Develop strategic intelligence reports for different audiences, clearly communicating findings using data storytelling.
Compétences que vous acquerrez
- Catégorie : Threat Detection
- Catégorie : Intelligence Collection and Analysis
- Catégorie : Data Storytelling
- Catégorie : Communication
- Catégorie : Business Writing
- Catégorie : MITRE ATT&CK Framework
- Catégorie : Report Writing
- Catégorie : Threat Modeling
- Catégorie : Presentations
- Catégorie : Risk Analysis
- Catégorie : Research Reports
- Catégorie : Threat Management
- Catégorie : Analysis
- Catégorie : Verbal Communication Skills
- Catégorie : Cybersecurity
- Catégorie : Vulnerability Assessments
- Catégorie : Incident Response
- Catégorie : Cyber Security Strategy
- Catégorie : Cyber Threat Intelligence
- Catégorie : Technical Communication
Détails à connaître

Ajouter à votre profil LinkedIn
novembre 2025
Découvrez comment les employés des entreprises prestigieuses maîtrisent des compétences recherchées

Il y a 6 modules dans ce cours
In this course, you’ll learn how to identify, analyze, and respond to evolving cyber threats. You’ll focus on advanced threat intelligence techniques, including data collection, analysis of threat actors, and malware correlation, using frameworks like MITRE ATT&CK and NIST 800-53. Through expert instruction, real-world case studies, and hands-on exercises, you’ll gain the skills to interpret intelligence from multiple sources, assess risks, and develop strategic reports. By the end of this course, you’ll be equipped to protect your organization from cyber threats, effectively communicate findings, and lead proactive defense initiatives across your business.
Inclus
1 vidéo1 lecture
In this module, you’ll learn how to embed security directly into your applications and development processes. You’ll explore Secure by Design principles, secure coding techniques, and secure configuration practices to prevent critical vulnerabilities. Through practical demonstrations, static and dynamic application security testing, and runtime protection strategies, you’ll develop the skills to identify, mitigate, and manage vulnerabilities throughout the software development lifecycle. This module emphasizes proactive security practices aligned with industry standards such as OWASP Top 10 and SANS Top 25 to ensure robust, production-ready applications.
Inclus
10 vidéos1 lecture1 devoir1 évaluation par les pairs1 sujet de discussion
In this module, you’ll learn how to analyze, attribute, and model cyber threats using structured, evidence-based intelligence techniques. You’ll work with methods like ACH, red teaming, and scenario modeling to evaluate adversary behavior, identify analytical biases, and communicate confidence levels clearly. You’ll also build strategic threat models using frameworks such as STRIDE, ATT&CK, and NIST 800-30, ensuring your assessments align with real organizational risk. By focusing on rigorous analysis and defensible reasoning, this module prepares you to produce reliable intelligence that supports strong, strategic cybersecurity decisions.
Inclus
10 vidéos1 lecture1 devoir1 évaluation par les pairs1 sujet de discussion
In this module, you’ll learn how to perform advanced threat research, correlate complex attack indicators, and map adversary infrastructure across multiple data sources. You’ll explore collection planning, OSINT tradecraft, malware analysis workflows, and behavioral fingerprinting techniques to uncover patterns in threat activity. Through hands-on tools, graph analytics, and real-world case studies, you’ll develop the skills to connect campaigns, identify threat actors, and build accurate intelligence assessments that strengthen attribution and support proactive defense.
Inclus
9 vidéos1 lecture1 devoir1 évaluation par les pairs1 sujet de discussion
In this module, you’ll learn how to turn complex technical threat intelligence into clear, actionable insights tailored for different audiences across an organization. You’ll practice structuring reports, communicating uncertainty with confidence, and presenting intelligence in formats suited for executives, SOC teams, legal stakeholders, and board members. Through hands-on exercises and real-world examples, you’ll develop the skills to write professional intelligence reports, use visual storytelling, and leverage modern reporting tools to support strategic decision-making and drive meaningful security actions.
Inclus
10 vidéos1 lecture1 devoir1 évaluation par les pairs1 sujet de discussion
In this final module, you’ll apply everything you’ve learned by analyzing a simulated threat actor campaign and turning raw intelligence into a clear, stakeholder-ready brief. You’ll correlate indicators across multiple sources, assess risk and confidence levels, and use structured analysis and reporting techniques to deliver actionable insights that support real-world security decision-making.
Inclus
1 vidéo1 évaluation par les pairs
Instructeurs


Offert par
Pour quelles raisons les étudiants sur Coursera nous choisissent-ils pour leur carrière ?





Ouvrez de nouvelles portes avec Coursera Plus
Accès illimité à 10,000+ cours de niveau international, projets pratiques et programmes de certification prêts à l'emploi - tous inclus dans votre abonnement.
Faites progresser votre carrière avec un diplôme en ligne
Obtenez un diplôme auprès d’universités de renommée mondiale - 100 % en ligne
Rejoignez plus de 3 400 entreprises mondiales qui ont choisi Coursera pour les affaires
Améliorez les compétences de vos employés pour exceller dans l’économie numérique
Foire Aux Questions
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
Plus de questions
Aide financière disponible,
¹ Certains travaux de ce cours sont notés par l'IA. Pour ces travaux, vos Données internes seront utilisées conformément à Notification de confidentialité de Coursera.

