CTI


 

 Data and Threat Analysis 

  1. This week, the data collected using the methods and sources you identified previously is analyzed for usable threat intelligence for your organization.

    Complete the following steps to document your work for your project this week:

    1. Describe methods and tools of validation and analysis.
    2. Illustrate 2 visualizations constructed for analysis.
    3. Articulate structured analysis of competing hypotheses.
    4. Explain threat analysis findings.
    5. Cite any references to support your assignment.