Section 2: How to Collect Threat Intelligence
Section 2 of Operationalizing Threat Intelligence builds upon Section 1 of the book with the introduction of core concepts related to how to collect, enrich, and analyze threat data and intelligence. This section addresses and answers the questions How to do I collect threat intelligence? and How do I perform threat hunting and pivoting? The chapters throughout Section 2 cover everything from understanding operational security to threat intelligence similarity clustering.
This part of the book comprises the following chapters:
- Chapter 5, Operational Security (OPSEC)
- Chapter 6, Technical Threat Intelligence – Collection
- Chapter 7, Technical Threat Analysis – Enrichment
- Chapter 8, Technical Threat Analysis – Threat Hunting and Pivoting
- Chapter 9, Technical Threat Analysis – Similarity Analysis