92% Booked
Registration Closed
Professional Certification Program
This 6-day workshop offers a comprehensive, hands-on learning experience in AI-powered Cyber Threat Intelligence (CTI). Participants will gain in-depth knowledge of advanced techniques for analyzing the Dark Web, detecting threats using AI, and developing proactive defense strategies. The workshop blends theory with practical labs, focusing on real-world applications like threat detection, risk mitigation, and integrating CTI into security operations. By the end, participants will be equipped to anticipate, detect, and counteract cyber threats effectively, leveraging cutting-edge AI tools and frameworks.
To equip participants with advanced skills in AI-driven Cyber Threat Intelligence, enabling them to effectively analyze Dark Web data, detect emerging threats, and implement proactive defense strategies to safeguard digital infrastructures from cyber adversaries.
Day 1: Introduction to Cyber Threat Intelligence (CTI) and Threat Actors
Overview of CTI, its lifecycle, and types of intelligence
Understanding threat actors and attack vectors (phishing, malware, APTs)
OSINT tools: WHOIS, Shodan, Maltego
Day 2: Collection and Processing of Threat Data
Sources: Open-source, closed-source, and internal data
Data collection techniques: Passive vs active, legal and ethical considerations
Using tools like MISP and ThreatConnect for IOC analysis
Day 3: Advanced Threat Analysis and Attribution
Techniques for anomaly detection, pattern recognition, and correlation
Malware analysis for CTI: Static vs dynamic
Threat attribution and case studies (APT29, Lazarus Group)
Day 4: AI-Powered Threat Detection and Monitoring
Introduction to AI/ML applications in CTI
Building and applying threat detection models
Practical lab: Using AI for real-time threat monitoring
Day 5: Operational Integration and Threat Intelligence Sharing
Integrating CTI into SIEM and SOAR platforms
Automating threat detection and response
Sharing intelligence: ISACs, STIX/TAXII standards
Day 6: Capstone Project and Final Exercise
Simulated cyber incident scenario
Collecting and analyzing threat intelligence
Creating actionable intelligence reports and recommendations
This workshop is ideal for:
Security Analysts, SOC Engineers, and Incident Responders looking to enhance CTI skills.
Network/Security Administrators transitioning into CTI.
Risk and Compliance Officers seeking advanced threat intelligence knowledge.
AI/ML Engineers or Data Scientists interested in cybersecurity applications.
Graduate Students or Professionals in Cybersecurity, AI, or Information Security.
Pre-requisites: Basic understanding of cybersecurity principles and a willingness to learn AI techniques.
08/17/2025
Indian Standard Timing 8 PM
08/17/2025 to 08/22/2025
Indian Standard Timing 9 PM ( Indian Standerd Time )
INR.
USD.
Take your research to the next level!
Achieve excellence and solidify your reputation among the elite!
Digital Twins: Predictive …
AI, Biopolymers, and Smart …
AI-Powered Drug Discovery with …
Machine Learning Approaches …
none
PhD in Computational Mechanics from MIT with 15+ years of experience in Industrial AI. Former Lead Data Scientist at Tesla and current advisor to Fortune 500 manufacturing firms.
Instant Access
Not sure if this course is right for you? Schedule a free 15-minute consultation with our academic advisors.