Skip to Main Content

CS445

Download as PDF

Cyber Threat Intelligence

SCIS Sch of Computing & Info Sys

Course (UG/PG)

Undergraduate

Offering Unit/Department

Course Description

Cyber threat intelligence can potentially be a force multiplier for organizations looking to update their cyber posture, specifically their response and detection programs to deal with increasingly sophisticated advanced persistent threats. Adversaries are constantly developing new tools, techniques, tactics and procedures to bypass security mechanisms successfully.
Cyber threat intelligence empowers cyber defenders on countering those flexible and persistent threats with a good understanding of the attacker’s behaviour, motivation and playbook. During an attack, an organization needs a top-notch and cutting-edge threat hunting or incident response team armed with the threat intelligence necessary to understand how adversaries operate and to counter the threat.
Cyber Threat Intelligence course will equip students with a brief understanding of various aspects of cyber threat intelligence – in the tactical, operational, and strategic level cyber threat intelligence skills and tradecraft required to make security teams better, threat hunting more accurate, incident response more effective, and organizations more aware of the evolving threat landscape.

Course Learning Outcomes

1. Students should have a working understanding of cyber threat intelligence, able to define why there is a need for cyber threat intelligence, why the existing monitor and respond strategy is failing and how cyber threat intelligence can be applied tactical, operational and strategic level to augment existing security measures in the organization.

2. Students should be able to develop cyber threat intelligence requirements, to prioritize assets to protect and sort assets by various classification such as personal information, intellectual property, confidential business information, credentials and systems information. Students should also understand how to leverage threat indicators, attribute it to threat actors and apply it to brief stakeholders.

3. Students should be able to have a brief understanding of various cyber threat actors profiles, sorted according to espionage, cyber-criminals and hacktivists, their different motivations and modus oprendi. Students should also understand that these characteristics help to determine potential targets, which data or assets are valuable to them, and how they will carry out their attacks. For instance, cybercriminals are opportunistic, and they will target any entities that can generate monetary gain. Therefore, any organization with valuable or sensitive data could be a target. On the other hand, nation-state actors conduct more targeted operations against organizations they want to exploit for strategic espionage or intelligence gathering purposes.

4. Student who join this course can be eligible for a Cyber Threat Intelligence job in the Cyber Security industry.

Discipline-Specific Competencies

Business Innovation, Business Risk Management, Data Engineering, Data Visualisation, Intelligent Reasoning

SMU Graduate Learning Outcomes

Disciplinary Knowledge, Multidisciplinary Knowledge, Interdisciplinary Knowledge, Critical thinking & problem solving, Collaboration and leadership, Communication, Ethics and social responsibility, Self-directed learning, Resilience

Grading Basis

GRD - Graded

Course Units

1