🕵️
CompTIA CySA+
  • Introduction
  • Overview
  • Threat and Vulnerability Management
    • Threat Intelligence
      • Threat Actors
      • Intelligence Sources
      • Indicators of Compromise
      • Confidence Levels
      • Threat Classification
      • Intelligence Cycle
    • Threat Analysis
      • Attack Frameworks
      • Threat Research
      • Threat Modeling
      • Supporting Other Cybersecurity Functions
    • Assessment Tools & Techniques
      • Enumeration
      • Infrastructure Scanners
      • Wireless Scanning
      • Web App Scanners
      • Software Analysis
      • Cloud Security Analysis
    • Vulnerability Management
      • Scanning Criteria
      • Identification
      • Validation
      • Remediation
      • Remediation Inhibitors
    • Special Technology
    • Cloud Security
    • Attacks & Vulnerabilities
  • Software and Systems Security
    • Infrastructure Management
    • Hardware Assurance
    • Software Assurance
  • Security Operations and Monitoring
    • Network Security
    • Security Monitoring
      • Heuristics
      • Trend Analysis
      • Host-based Analysis
      • Network Analysis
      • Log Review
      • Impact Analysis
      • SIEM Review
      • Query Writing
      • Email Analysis
    • Threat Hunting
    • Automation
  • Incident Response
    • Process
    • Procedures
    • Indicators of Compromise
    • Digital Forensics
  • Compliance and Assessment
    • Risk Mitigation
    • Governance
    • Privacy
Powered by GitBook
On this page

Was this helpful?

  1. Threat and Vulnerability Management
  2. Threat Intelligence

Threat Classification

Explain the importance of threat data and intelligence.

Known vs Unknown Threats

Zero-Days

Advanced Persistent Threats

PreviousConfidence LevelsNextIntelligence Cycle

Last updated 4 years ago

Was this helpful?