Enhance your Google Threat Intelligence (GTI) expertise with our comprehensive resources and training, designed for both new and experienced users. Our comprehensive playbook will help you build foundational knowledge and apply it directly to your specific use cases, rapidly increasing your proficiency and ensuring effective product adoption.
Here's how to get the most out of your GTI experience:
- Step 1: Kickstart your onboarding with the Google Cloud Security Community. Sign up and access our dedicated GTI onboarding guide to lay the groundwork for your understanding.
- Step 2: Engage with the GTI community forums. Participate in discussions on the Google Cloud Security Community to ask questions, share insights, and learn from other GTI users and experts.
- Step 3: Validate your practical knowledge with Skillboost. Sign up for Skillboost and complete the self-paced GTI training modules to earn badges that demonstrate your proficiency. This hands-on learning approach ensures you gain immediately applicable skills. Should you require Skillboost access, you can request it here.
- For advanced use cases and in-depth insights, explore our YouTube channel and the content available on BrightTalk.
- Always refer to the official GTI Documentation site for the most accurate and up-to-date information on Google Threat Intelligence.
Journey & Actions
In the Google Threat Intelligence Journey, you will navigate through four main tasks of implementation:
1.1. Onboarding
1.2. Admin Setup
1.3. Threat Landscape
1.4. Attack Surface Management
2.1. Digital Threat Monitoring
2.2. Vulnerability Intelligence
3.1. IOC Investigation
3.2. Private Scanning
3.3. Threat Graph
4.1. Reports & Analysis
The Full Journey to Completion:
Google Threat Intelligence: Step 1: Direction
Google Threat Intelligence: Step 1.1 - Direction | Onboarding
Google Threat Intelligence: Step 1.2 - Direction | Admin Setup
Google Threat Intelligence: Step 1.3 - Direction | Threat Landscape
Google Threat Intelligence: Step 1.4 - Direction | Attack Surface Management
Google Threat Intelligence: Step 2 - Collection Overview
Google Threat Intelligence: Step 2.1 - Collection | Digital Threat Monitoring
Google Threat Intelligence: Step 2.2 - Collection | Vulnerability Intelligence
Google Threat Intelligence: Step 3 - Analysis Overview
Google Threat Intelligence: Step 3.1 - Analysis | IOC Investigation
Google Threat Intelligence: Step 3.2 - Analysis | Private Scanning
Google Threat Intelligence: Step 3.3 - Analysis | Threat Graph
Google Threat Intelligence: Step 4 - Dissemination Overview
Google Threat Intelligence: Step 4.1 - Dissemination | Reports & Analysis
Ismahan El-Frih & Koby Takahashi
Google Cloud Security Customer Success & Customer Excellence