Skip to main content

Enhance your Google Threat Intelligence (GTI) expertise with our comprehensive resources and training, designed for both new and experienced users. Our comprehensive playbook will help you build foundational knowledge and apply it directly to your specific use cases, rapidly increasing your proficiency and ensuring effective product adoption.

Here's how to get the most out of your GTI experience:

  • Step 1: Kickstart your onboarding with the Google Cloud Security Community. Sign up and access our dedicated GTI onboarding guide to lay the groundwork for your understanding.
  • Step 2: Engage with the GTI community forums. Participate in discussions on the Google Cloud Security Community to ask questions, share insights, and learn from other GTI users and experts.
  • Step 3: Validate your practical knowledge with Skillboost. Sign up for Skillboost and complete the self-paced GTI training modules to earn badges that demonstrate your proficiency. This hands-on learning approach ensures you gain immediately applicable skills. Should you require Skillboost access, you can request it here.
  • For advanced use cases and in-depth insights, explore our YouTube channel and the content available on BrightTalk.
  • Always refer to the official GTI Documentation site for the most accurate and up-to-date information on Google Threat Intelligence.

Journey & Actions

In the Google Threat Intelligence Journey, you will navigate through four main tasks of implementation: 

  1. Direction 

1.1. Onboarding

1.2. Admin Setup

1.3. Threat Landscape

1.4. Attack Surface Management

  1. Collection

2.1. Digital Threat Monitoring

2.2. Vulnerability Intelligence

  1. Analysis

3.1. IOC Investigation

3.2. Private Scanning

3.3. Threat Graph

  1. Dissemination

4.1. Reports & Analysis

 

The Full Journey to Completion:

 
Google Threat Intelligence: Step 1: Direction 

Google Threat Intelligence: Step 1.1 - Direction | Onboarding

Google Threat Intelligence: Step 1.2 - Direction | Admin Setup

Google Threat Intelligence: Step 1.3 - Direction | Threat Landscape

Google Threat Intelligence: Step 1.4 - Direction | Attack Surface Management

Google Threat Intelligence: Step 2 - Collection Overview

Google Threat Intelligence: Step 2.1 - Collection | Digital Threat Monitoring

Google Threat Intelligence: Step 2.2 - Collection | Vulnerability Intelligence 

Google Threat Intelligence: Step 3 - Analysis Overview

Google Threat Intelligence: Step 3.1 - Analysis | IOC Investigation

Google Threat Intelligence: Step 3.2 - Analysis | Private Scanning

Google Threat Intelligence: Step 3.3 - Analysis | Threat Graph

Google Threat Intelligence: Step 4 - Dissemination Overview

Google Threat Intelligence: Step 4.1 - Dissemination | Reports & Analysis

 

Ismahan El-Frih & Koby Takahashi

Google Cloud Security Customer Success & Customer Excellence

Nicely done @Ismahan and @kobydayo 👏


Here’s an updated Threat Intel course template on CloudSkillsBoost (1186) -


The previous course (1152) has been deprecated.


Reply