From the course: Advanced Strategic Threat Intelligence Research and Reporting
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Collection planning and source prioritization
From the course: Advanced Strategic Threat Intelligence Research and Reporting
Collection planning and source prioritization
Welcome to this video, collection planning and source prioritization. Ever felt like you're drowning in Intel feeds? Let's flip that chaos into a laser-focused collection plan. In this video, we'll explore advanced OSINT tradecraft and collection planning through these key areas. Intelligence requirements, IRs, definition source mapping, sensor networks, honeypots, and dark web monitoring, SIGINT integration and private CTI feed leveraging, prioritization matrices, and collection execution plans, CEP. By the end of this video, you'll be able to formulate evidence-based collection plans effectively. Rank OSINT, SIGINT, and private CTI sources. Apply source prioritization by relevance and reliability. design comprehensive collection execution plans. Let's start by examining how to transform vague business concerns into precise intelligence requirements. Define mission questions. Before we ever pull a single log or scrape a dark web forum, we need to synthesize the messy worries of…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.