Skip to main content

Enhance your Google Threat Intelligence (GTI) expertise with our comprehensive resources and training, designed for both new and experienced users. Our comprehensive playbook will help you build foundational knowledge and apply it directly to your specific use cases, rapidly increasing your proficiency and ensuring effective product adoption.


Here's how to get the most out of your GTI experience:



  • Step 1: Kickstart your onboarding with the Google Cloud Security Community. Sign up and access our dedicated GTI onboarding guide to lay the groundwork for your understanding.

  • Step 2: Engage with the GTI community forums. Participate in discussions on the Google Cloud Security Community to ask questions, share insights, and learn from other GTI users and experts.

  • Step 3: Validate your practical knowledge with Skillboost. Sign up for Skillboost and complete the self-paced GTI training modules to earn badges that demonstrate your proficiency. This hands-on learning approach ensures you gain immediately applicable skills. Should you require Skillboost access, you can request it here.

  • For advanced use cases and in-depth insights, explore our YouTube channel and the content available on BrightTalk.

  • Always refer to the official GTI Documentation site for the most accurate and up-to-date information on Google Threat Intelligence.


Journey & Actions


In the Google Threat Intelligence Journey, you will navigate through four main tasks of implementation: 



  1. Direction 


1.1. Onboarding


1.2. Admin Setup


1.3. Threat Landscape


1.4. Attack Surface Management



  1. Collection


2.1. Digital Threat Monitoring


2.2. Vulnerability Intelligence



  1. Analysis


3.1. IOC Investigation


3.2. Private Scanning


3.3. Threat Graph



  1. Dissemination


4.1. Reports & Analysis


 


The Full Journey to Completion:


 
Google Threat Intelligence: Step 1: Direction 


Google Threat Intelligence: Step 1.1 - Direction | Onboarding


Google Threat Intelligence: Step 1.2 - Direction | Admin Setup


Google Threat Intelligence: Step 1.3 - Direction | Threat Landscape


Google Threat Intelligence: Step 1.4 - Direction | Attack Surface Management


Google Threat Intelligence: Step 2 - Collection Overview


Google Threat Intelligence: Step 2.1 - Collection | Digital Threat Monitoring


Google Threat Intelligence: Step 2.2 - Collection | Vulnerability Intelligence 


Google Threat Intelligence: Step 3 - Analysis Overview


Google Threat Intelligence: Step 3.1 - Analysis | IOC Investigation


Google Threat Intelligence: Step 3.2 - Analysis | Private Scanning


Google Threat Intelligence: Step 3.3 - Analysis | Threat Graph


Google Threat Intelligence: Step 4 - Dissemination Overview


Google Threat Intelligence: Step 4.1 - Dissemination | Reports & Analysis


 


Ismahan El-Frih & Koby Takahashi


Google Cloud Security Customer Success & Customer Excellence

Nicely done @Ismahan and @kobydayo 👏


Reply