CompTIA CySA+
1 Threat Management
1-1 Threat Landscape
1-1 1 Identifying Threat Actors
1-1 2 Understanding Threat Vectors
1-1 3 Threat Intelligence Sources
1-1 4 Threat Intelligence Lifecycle
1-2 Threat Hunting
1-2 1 Threat Hunting Concepts
1-2 2 Threat Hunting Techniques
1-2 3 Threat Hunting Tools
1-3 Threat Modeling
1-3 1 Threat Modeling Concepts
1-3 2 Threat Modeling Techniques
1-3 3 Threat Modeling Tools
1-4 Threat Mitigation
1-4 1 Threat Mitigation Strategies
1-4 2 Threat Mitigation Techniques
1-4 3 Threat Mitigation Tools
2 Vulnerability Management
2-1 Vulnerability Identification
2-1 1 Vulnerability Scanning
2-1 2 Vulnerability Assessment
2-1 3 Vulnerability Identification Tools
2-2 Vulnerability Analysis
2-2 1 Vulnerability Analysis Techniques
2-2 2 Vulnerability Analysis Tools
2-3 Vulnerability Prioritization
2-3 1 Vulnerability Prioritization Techniques
2-3 2 Vulnerability Prioritization Tools
2-4 Vulnerability Remediation
2-4 1 Vulnerability Remediation Techniques
2-4 2 Vulnerability Remediation Tools
3 Cyber Incident Response
3-1 Incident Response Planning
3-1 1 Incident Response Plan Development
3-1 2 Incident Response Team Roles
3-1 3 Incident Response Plan Testing
3-2 Incident Detection
3-2 1 Incident Detection Techniques
3-2 2 Incident Detection Tools
3-3 Incident Analysis
3-3 1 Incident Analysis Techniques
3-3 2 Incident Analysis Tools
3-4 Incident Response
3-4 1 Incident Response Techniques
3-4 2 Incident Response Tools
3-5 Incident Recovery
3-5 1 Incident Recovery Techniques
3-5 2 Incident Recovery Tools
4 Security Architecture and Tool Sets
4-1 Security Controls
4-1 1 Security Control Types
4-1 2 Security Control Implementation
4-1 3 Security Control Monitoring
4-2 Security Tools
4-2 1 Security Tool Categories
4-2 2 Security Tool Implementation
4-2 3 Security Tool Monitoring
4-3 Security Architecture
4-3 1 Security Architecture Concepts
4-3 2 Security Architecture Design
4-3 3 Security Architecture Implementation
5 Compliance and Assessment
5-1 Compliance Requirements
5-1 1 Compliance Standards
5-1 2 Compliance Audits
5-1 3 Compliance Reporting
5-2 Assessment Techniques
5-2 1 Assessment Methodologies
5-2 2 Assessment Tools
5-2 3 Assessment Reporting
5-3 Risk Management
5-3 1 Risk Management Concepts
5-3 2 Risk Management Techniques
5-3 3 Risk Management Tools
6 Software Development Security
6-1 Secure Coding Practices
6-1 1 Secure Coding Principles
6-1 2 Secure Coding Techniques
6-1 3 Secure Coding Tools
6-2 Software Development Lifecycle
6-2 1 SDLC Phases
6-2 2 SDLC Security Practices
6-2 3 SDLC Security Tools
6-3 Software Testing
6-3 1 Software Testing Techniques
6-3 2 Software Testing Tools
6-3 3 Software Testing Security
7 Security Operations
7-1 Security Operations Concepts
7-1 1 Security Operations Roles
7-1 2 Security Operations Processes
7-1 3 Security Operations Tools
7-2 Security Monitoring
7-2 1 Security Monitoring Techniques
7-2 2 Security Monitoring Tools
7-3 Security Incident Management
7-3 1 Incident Management Techniques
7-3 2 Incident Management Tools
7-4 Security Awareness Training
7-4 1 Security Awareness Training Concepts
7-4 2 Security Awareness Training Techniques
7-4 3 Security Awareness Training Tools
Threat Intelligence Lifecycle

Threat Intelligence Lifecycle

The Threat Intelligence Lifecycle is a structured process that helps organizations systematically collect, analyze, and act upon threat intelligence. Understanding this lifecycle is crucial for effective cybersecurity management. Here are the key stages:

1. Direction

The Direction stage involves defining the objectives and scope of the threat intelligence effort. This includes identifying the specific threats that need to be monitored and the stakeholders who will benefit from the intelligence. For example, an organization might decide to focus on detecting advanced persistent threats (APTs) targeting their industry.

2. Collection

In the Collection stage, data is gathered from various sources such as open-source intelligence (OSINT), closed or proprietary intelligence, and technical intelligence (TECHINT). This data includes indicators of compromise (IOCs), threat actor profiles, and attack patterns. For instance, collecting data from security forums and threat feeds can provide insights into emerging malware variants.

3. Processing

The Processing stage involves organizing and normalizing the collected data to make it usable. This includes filtering out irrelevant information, categorizing data, and converting it into a standardized format. For example, IP addresses and file hashes identified as malicious in threat feeds are processed to be integrated into the organization's security systems.

4. Analysis

During the Analysis stage, the processed data is examined to derive actionable insights. This involves identifying trends, correlations, and potential threats. Analysts use various techniques such as threat hunting, correlation analysis, and predictive modeling. For instance, analyzing network traffic patterns might reveal a new phishing campaign targeting employees.

5. Dissemination

In the Dissemination stage, the analyzed intelligence is shared with relevant stakeholders within the organization. This ensures that the right people have access to the information needed to make informed decisions. For example, a report on a new ransomware variant might be disseminated to the IT and security teams for immediate action.

6. Feedback

The Feedback stage involves gathering input from stakeholders to improve the threat intelligence process. This includes evaluating the effectiveness of the intelligence and making necessary adjustments. For example, if a threat alert led to the successful mitigation of an attack, the feedback might suggest refining the collection and analysis methods for similar threats.

7. Archiving

The Archiving stage involves storing the collected and analyzed data for future reference. This archived data can be used for historical analysis, compliance purposes, and to improve future threat intelligence efforts. For instance, storing past threat reports can help in identifying recurring attack patterns and improving defenses.

By following these stages, organizations can effectively manage and utilize threat intelligence to enhance their cybersecurity posture.