TRAINING COURSES

HOME   /   TRAINING   /   DIGITAL FORENSICS & INCIDENT RESPONSE

Applied Threat Intelligence

Join some of the industry’s elite for this two-day course and learn the secrets to getting the most from threat intelligence.

Rooted in traditional intelligence analysis techniques, threat intelligence is one of the best tools today for understanding and dealing with the ever-growing complexity of the threat landscape. However, it’s generally poorly applied and understood.

Learn how to collect, analyze and use threat intelligence data, tools and frameworks with the support of experts, and immerse yourself in hands-on, real-life threat hunting and incident response scenarios plus how to apply findings in order to protect a particular network.

This course is offered in two formats: Hunting and Defending. Choose either or both to benefit from the most relevant best practice, expert insights, plus practical tools and frameworks.

Learning Objectives

Students will understand:

  • Understand how to distill a huge volume of data and transform it into intelligence
  • Get to grips with threat hunting fundamentals and adversary profiling
  • Gain practical skills for applying threat intelligence data in various scenarios including defending, incident response and forensic analysis

Prerequisites

  • Basic knowledge of cybersecurity concepts and the cyber threat landscape.
  • Familiarity with different types of malware and attack vectors.
  • Basic experience with command-line interfaces and basic (CLI).
  • Some programming/scripting experience will be bene cial but not mandatory (e.g., Python, PowerShell)
Applied Threat Intelligence Course
  • TARGET AUDIENCE

  • Operations Center (SOC) Analysts
  • Threat Intelligence Analysts
  • SIEM Analysts
  • CERT Managers and Analyst
  • Law Enforcement Specialists
  • Incident Response Team Member
  • IT Security Consultants
  • Information Security Managers

  • Standard Rate

Why choose the Center for Cyber Security Training

Interactive, classroom-based learning

Subject matter experts

Trusted by US government agencies

peter-van
Peter Van Eeckhoutte

Peter Van Eeckhoutte is the founder of Corelan Team and the author of the well-known tutorials on Win32 Exploit Development Training. The team gathers a group of IT Security enthusiasts and researchers from around the world, who all share common interests : doing research, gather & share knowledge, and perform responsible/coordination disclosure. Above all, the team is well known for their ethics and their dedication to helping other people in the community. Together with the team, he has developed and published numerous tools that will assist pentesters and exploit developers, and published whitepapers/video’s on a wide range of IT Security related topics (pentesting tools, (malware) reverse engineering, etc).

You can find some of the tools on the Corelan github page.

Peter has been an active member of the IT Security community since 2000 and has been working on exploit development since 2006. He presented at various international security conferences (Athcon, Hack In Paris, DerbyCon, ISSA Belgium) and taught various Win32 Exploit Development courses at numerous places around the globe. He trained security enthusiasts & professionals from private companies, government agencies and military organizations.

Classes are limited. Get registered!

One of the most gruelling yet beneficial training courses that I have ever attended in my entire ofsec career! This course is definitely a good start for those who really want to get well acquainted with the basics of exploit development. On top of that, Peter is such an amazing instructor in terms of delivering his content and sharing with us some tips and tricks when facing problems during the lab exercises. Highly recommend.

Hamzah, Singapore

Want more information?

Download the Applied Threat Intelligence Course outline now.

Upcoming Training Sessions

March 10-13, 2025 (In-person, Columbia, MD) August 25-28, 2025 (In-person, Columbia, MD)

Classes are limited.

Enroll Now.

Related Courses

Our classroom delivers the most in-demand content from the highest profile subject matter experts. Intense and interactive, our courses prepare students with actionable insight and proven strategies.

hands-on-threat-modeling

Hands-On Threat Modeling

Start your journey into threat modeling with this beginner-friendly guide that builds a strong foundation for secure software development. You'll learn how to identify vulnerabilities, evaluate application threats, and model potential attacks — all during the critical software design phase. Mastering these skills will help you create stronger designs, guide focused security testing, and build more resilient applications from the ground up.

applied-data-science-for-cyber-security

Applied Data Science & Machine Learning for A.I. & Cybersecurity

Build a strong foundation in data science and machine learning with this hands-on course designed for cybersecurity professionals. You'll learn how to manipulate, analyze, and visualize real-world security data, apply AI techniques to uncover hidden insights, and master the full data science process — from data preparation to model deployment. No advanced Python skills required — just a passion for solving cybersecurity challenges with cutting-edge tools and techniques.

Looking for a course that's not here? We'd love to hear your suggestions!

Are you fully prepared to deal with today's increasing cyber security risks? We can help you get the training you need.

TRAINING INQUIRY

*We respect your privacy