Identifying and incorporating reliable threat intelligence into your cyber security program is one of the keys to detecting potential intrusions or infections. This hands-on course will help you identify reliable threat intelligence sources and help you incorporate the data sources into your security monitoring program.
To register: https://ce.jccc.edu/courseDisplay.cfm?schID=22333