Starweaver
Basics of Cyber Threat Intelligence

Saving $160 on access to 10,000+ programs is a holiday treat. Save now.

Starweaver

Basics of Cyber Threat Intelligence

Starweaver
Tom Themeles

Instructors: Starweaver

Included with Coursera Plus

Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

7 hours to complete
Flexible schedule
Learn at your own pace
Gain insight into a topic and learn the fundamentals.
Intermediate level

Recommended experience

7 hours to complete
Flexible schedule
Learn at your own pace

What you'll learn

  • Explain core principles, types, lifecycle, and role of cyber threat intelligence in defense.

  • Apply CIA Triad and risk management to turn data into actionable threat insights.

  • Describe core concepts, functions, and uses of Threat Intelligence Platforms (TIPs).

  • Use CTI tools to analyze threats, map tactics via MITRE ATT&CK, and plan responses.

Details to know

Shareable certificate

Add to your LinkedIn profile

Recently updated!

November 2025

Assessments

4 assignments¹

AI Graded see disclaimer
Taught in English

See how employees at top companies are mastering in-demand skills

 logos of Petrobras, TATA, Danone, Capgemini, P&G and L'Oreal

There are 6 modules in this course

In this course, you’ll learn how to transform raw cyber data into actionable intelligence to anticipate, detect, and respond to evolving threats. You’ll explore the full cyber threat intelligence (CTI) lifecycle, from collection and analysis to reporting and application, while using frameworks like MITRE ATT&CK and tools such as SIEM, SOAR, and Threat Intelligence Platforms. Through real-world case studies, hands-on exercises, and guided analysis, you’ll develop the skills to identify attacker tactics, integrate intelligence into security operations, and strengthen your organization’s defense posture.

What's included

1 video1 reading

In this module, you’ll explore the foundations of Cyber Threat Intelligence (CTI) and its vital role in modern cybersecurity. You’ll discover how CTI transforms raw data into actionable intelligence, examine the differences between data, information, and intelligence, and understand who uses CTI and why. Through real-world examples and an in-depth look at the Threat Intelligence Lifecycle, you’ll learn how organizations gather, analyze, and apply intelligence to defend against evolving cyber threats. This module lays the groundwork for building intelligence-driven security strategies across operational, tactical, and strategic levels.

What's included

10 videos1 reading1 assignment1 peer review1 discussion prompt

In this module, you’ll explore how core information security principles underpin the development and application of Cyber Threat Intelligence (CTI). You’ll examine the CIA Triad—Confidentiality, Integrity, and Availability—as the foundation for secure data handling and resilient threat intelligence operations. You’ll also learn how risk management frameworks turn intelligence into action, guiding asset prioritization, vulnerability assessment, and control selection. Through practical applications and real-world examples, you’ll discover how to apply these principles across the CTI lifecycle to ensure intelligence is accurate, timely, and actionable.

What's included

10 videos1 reading1 assignment1 peer review1 discussion prompt

In this module, you’ll gain hands-on experience using Cyber Threat Intelligence (CTI) tools and frameworks to detect, analyze, and respond to cyber threats. You’ll learn to identify Indicators of Compromise (IOCs), map attacker behavior using MITRE ATT&CK, and translate intelligence into clear, actionable response strategies. Through guided simulations and real-world exercises, you’ll build confidence in using CTI to strengthen both proactive defense and incident response operations. By the end, you’ll understand how intelligence-driven actions can minimize risk, reduce response time, and improve overall cyber resilience.

What's included

10 videos1 reading1 assignment1 peer review1 discussion prompt

In this module, you’ll gain hands-on experience using Cyber Threat Intelligence (CTI) tools and frameworks to detect, analyze, and respond to cyber threats. You’ll learn to identify Indicators of Compromise (IOCs), map attacker behavior using MITRE ATT&CK, and translate intelligence into clear, actionable response strategies. Through guided simulations and real-world exercises, you’ll build confidence in using CTI to strengthen both proactive defense and incident response operations.

What's included

10 videos1 reading1 assignment1 peer review1 discussion prompt

In this final module, you’ll bring together everything you’ve learned across the course—foundations of cyber threat intelligence, information security principles, TIP integrations, and incident response. You’ll apply your skills in a project that challenges you to analyze a real-world cyber incident, identify threat actors, assess malware, and design an actionable intelligence report.

What's included

1 video1 peer review

Instructors

Starweaver
Starweaver
448 Courses863,068 learners
Tom Themeles
1 Course367 learners

Offered by

Starweaver

Explore more from Security

Why people choose Coursera for their career

Felipe M.
Learner since 2018
"To be able to take courses at my own pace and rhythm has been an amazing experience. I can learn whenever it fits my schedule and mood."
Jennifer J.
Learner since 2020
"I directly applied the concepts and skills I learned from my courses to an exciting new project at work."
Larry W.
Learner since 2021
"When I need courses on topics that my university doesn't offer, Coursera is one of the best places to go."
Chaitanya A.
"Learning isn't just about being better at your job: it's so much more than that. Coursera allows me to learn without limits."
Coursera Plus

Open new doors with Coursera Plus

Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription

Advance your career with an online degree

Earn a degree from world-class universities - 100% online

Join over 3,400 global companies that choose Coursera for Business

Upskill your employees to excel in the digital economy

Frequently asked questions

¹ Some assignments in this course are AI-graded. For these assignments, your data will be used in accordance with Coursera's Privacy Notice.