🕵️
CompTIA CySA+
  • Introduction
  • Overview
  • Threat and Vulnerability Management
    • Threat Intelligence
      • Threat Actors
      • Intelligence Sources
      • Indicators of Compromise
      • Confidence Levels
      • Threat Classification
      • Intelligence Cycle
    • Threat Analysis
      • Attack Frameworks
      • Threat Research
      • Threat Modeling
      • Supporting Other Cybersecurity Functions
    • Assessment Tools & Techniques
      • Enumeration
      • Infrastructure Scanners
      • Wireless Scanning
      • Web App Scanners
      • Software Analysis
      • Cloud Security Analysis
    • Vulnerability Management
      • Scanning Criteria
      • Identification
      • Validation
      • Remediation
      • Remediation Inhibitors
    • Special Technology
    • Cloud Security
    • Attacks & Vulnerabilities
  • Software and Systems Security
    • Infrastructure Management
    • Hardware Assurance
    • Software Assurance
  • Security Operations and Monitoring
    • Network Security
    • Security Monitoring
      • Heuristics
      • Trend Analysis
      • Host-based Analysis
      • Network Analysis
      • Log Review
      • Impact Analysis
      • SIEM Review
      • Query Writing
      • Email Analysis
    • Threat Hunting
    • Automation
  • Incident Response
    • Process
    • Procedures
    • Indicators of Compromise
    • Digital Forensics
  • Compliance and Assessment
    • Risk Mitigation
    • Governance
    • Privacy
Powered by GitBook
On this page

Was this helpful?

  1. Threat and Vulnerability Management

Threat Intelligence

Explain the importance of threat data and intelligence.

Threat Intelligence is insight into the capabilities and behavior of adversaries. In cyberspace, this insight can help reduce risk by enabling organizations to be proactive about their network defense posture.

PreviousOverviewNextThreat Actors

Last updated 4 years ago

Was this helpful?