Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Threat Intelligence with MISP

In this course, you will learn how to implement open source threat intelligence sharing and analysis using MISP.

Phil Chapman - Pluralsight course - Threat Intelligence with MISP
by Phil Chapman

What you'll learn

A major part of the threat intelligence cycle is the analysis and distribution of credible information, tactics, techniques and procedures and exploitations. MISP is one of a series of tools which effectively allows for the storing and dissemination of a wide range of cyber threat intelligence types. In this course, you’ll cover how to utilize MISP to detect and protect against indicators of compromise in an enterprise environment as part of the Threat Intelligence Program. First, you’ll get an understanding of what MISP is and how it can enhance your organizational Threat Intelligence Program. Next, you’ll understand how MISP is used throughout the intelligence sharing community and works as a mitigation technique within Mitre. Finally, you will understand how to install and configure MISP and analyze a variety of threat indicators of compromise, anomalies, and events. When you’re finished with this course, you’ll have the skills and knowledge to implement these detection techniques using MISP.

Table of contents

About the author

Phil Chapman - Pluralsight course - Threat Intelligence with MISP
Phil Chapman

Phil Chapman is a senior instructor. He is responsible for the delivery of a range of courses including official Microsoft, CompTIA, EC Council and BCS official certifications. He is also the subject matter expert and project lead for the bespoke Law Enforcement Cyber Security training packages which are delivered to UK Law Enforcement agencies and forces.

More Courses by Phil