Contact Sales
Contact Sales
NEW

FOR478: Cyber Threat Intelligence Foundations

FOR478Digital Forensics and Incident Response
  • 2 Days (Instructor-Led)
  • 16 Hours (Self-Paced)
Course authored by:
John DoyleAndreas SfakianakisJosh Darby MacLellan
John Doyle, Andreas Sfakianakis & Josh Darby MacLellan
FOR498: Digital Acquisition and Rapid Triage
Course authored by:
John DoyleAndreas SfakianakisJosh Darby MacLellan
John Doyle, Andreas Sfakianakis & Josh Darby MacLellan
  • 16 CPEs

    Apply your credits to renew your certifications

  • Essential Skill Level

    Course material is for individuals with an understanding of IT or cyber security concepts

  • 8 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Build core CTI skills through expert-led instruction, labs, and panel discussions on program architecture, research, workflows, and stakeholder support.

Course Overview

FOR478 provides a foundational understanding of Cyber Threat Intelligence (CTI) and its role within enterprise, government, and vendor contexts. It focuses on CTI program architecture, operationalized workflows, and delivering actionable insights to stakeholders. Expert-led panel discussions on CTI operations and labs complement course instruction.

What You'll Learn

  • Architect an effective CTI program that aligns service support to organizational needs
  • Manage requirements and build an actionable ICP that maps telemetry to stakeholder needs
  • Baseline threat actor history to contextualize evolving adversary goals and tactics
  • Analyze how geopolitical drivers and past adversary operations shape your threat landscape
  • Produce finished intelligence products that meet the standards employers and stakeholders expect
  • Apply intelligence tradecraft, CTI frameworks, and AI-assisted workflows used by working analysts
  • Map your professional skills to a career plan aligned against current industry needs

Business Takeaways

  • Return to work with a library of production-ready CTI program templates for immediate use
  • Reduce onboarding time for new CTI hires by grounding them in operational realities
  • Contextualize cyber news by identifying commonalities with past adversary operations
  • Anticipate stakeholder needs by mapping their workflows to drive high-impact CTI support
  • Confidently conduct stakeholder interviews to align CTI outputs with common pain points
  • Improved Strengthen threat research workflows through AI integration and intelligence tradecraft best practices during 9 hands-on labs
  • Extract insights from malware and logs to predict adversary actions and mitigate risk

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in FOR478: Cyber Threat Intelligence Foundations.

Section 1Foundational Elements of a CTI Program

Day 1 builds the foundational elements of a CTI program, covering the evolution of the CTI discipline, program structure, analyst KSA development and career planning, stakeholder analysis, collection management, and the CTI analyst workbench. The day features four hands-on labs.

Topics covered

  • Introduction to Cyber Threat Intelligence
  • The Evolution of the CTI Field and the Defining Characteristics of CTI
  • CTI Program Structure, Stakeholder Analysis, Intelligence Requirements, and Collection Management
  • The Intelligence Collection Plan, Collection Management, and Supporting CTI Data Sets
  • CTI Mechanics and Analytic Approaches

Labs

  • Lab 1.1: Building a CTI Career Plan
  • Lab 1.2: Drafting a CTI Program Charter
  • Lab 1.3: Developing Intelligence Requirements
  • Lab 1.4: Pivoting Between Data Sources

Section 2Cyber Threats and Stakeholder Workflows

Day 2 deconstructs the anatomy of cyber operations, tracing how state and non-state actor tradecraft evolves during geopolitical tensions and conflict. After baselining adversary behavior, students navigate the professional perils of threat research and media engagement. The day concludes by mapping workflows to various stakeholder audiences.

Topics covered

  • The Evolution of Cyber Operations
  • The Ethics and Perils of Threat Research
  • The Role of the Media and Journalists in CTI
  • Supporting Stakeholders by Audience Type: Strategic, Operational, and Tactical

Labs

  • Lab 2.1: Creating a Weekly Threat Intelligence Newsletter
  • Lab 2.2: Identifying Emergent Threats for Leadership
  • Lab 2.3: Contextualizing Intrusion Data and Visualizing Adversary Playbooks
  • Lab 2.4: Generating Adversary Intelligence from Malware

Things You Need To Know

We're updating our course schedule - please check back later.

Benefits of Learning with SANS

Bryan Simon: Teacher Standing Next to Smartboard and Explaining Concept

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Close Up of Woman Holding a Pen and Documents

Get access to our range of industry-leading courses and resources