Module 1: Introduction to Cyber Threat Intelligence
Module 2: Data Sources and Collection
Module 3: Data Processing and Analysis
Module 4: Threat Modeling and Actor Profiling
Module 5: Cyber Threat Intelligence Analytics
Module 6: Threat Intelligence Sharing
Module 7: Building a CTI Program
Module 8: Operationalizing CTI