Get Mystery Box with random crypto!

A Cyber Threat Intelligence Self-Study Plan: Part 2 https://me | OSIntOps News

A Cyber Threat Intelligence Self-Study Plan: Part 2
https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36
t’s been a while, but here it is — part 2 of my cyber threat intelligence (CTI) self-study plan. This is much later than I intended, but life happens. It has been wonderful to hear feedback on how part 1 helped many people learn more about CTI, and I truly appreciate everyone who reached out to say that this helped them. You all are the reason I created part 2, and I hope it’s just as helpful. For background on this plan and how I recommend using it, please read my first post. This post covers four topics:

- OSINT and Open Sources
- Pivoting
- Clustering, Naming, and Creating Groups
- Attribution