Malware Threat Map: Use Cases

Malware Threat Map: Use Cases

This course provides two recommended use cases that provide real-world examples: prioritize risk mitigation activities and vulnerability patch prioritization.

rate limit

Code not recognized.

About this course

This course provides Threat Intelligence users with a guide on how to effectively utilize the Recorded Future Threat Intelligence Malware Threat Map to identify and prioritize malware groups that are relevant to your enterprise. You will explore the key features and functionalities of the Malware Threat Map, including how to navigate and interpret the visual representations of malware groups

It is suggested that you have completed the Malware Threat Map: Overview course for an introduction and overview of the Malware Map before taking a deeper dive into the recommended use cases.

Upon completion of this course, you will be able to:

  • Identify and prioritize malware groups, enabling you to take proactive measures in securing your enterprise against evolving threats.
  • Prioritize your prevention and detection actions for malware families identified by the malware map.
  • Prioritize vulnerability patching, based on the association with a priority malware family as presented by the malware map

Successful completion of this pathway is eligible for .5 CPE credit from ISC2.

Please note: the Recorded Future Platform is constantly being updated and refined; images presented within this course may not reflect what is currently shown in the platform.

Curriculum00:19:00

  • Malware Threat Map: Use Cases 00:15:00
  • Survey 00:02:00
  • ISC2 CPE Submission 00:02:00

About this course

This course provides Threat Intelligence users with a guide on how to effectively utilize the Recorded Future Threat Intelligence Malware Threat Map to identify and prioritize malware groups that are relevant to your enterprise. You will explore the key features and functionalities of the Malware Threat Map, including how to navigate and interpret the visual representations of malware groups

It is suggested that you have completed the Malware Threat Map: Overview course for an introduction and overview of the Malware Map before taking a deeper dive into the recommended use cases.

Upon completion of this course, you will be able to:

  • Identify and prioritize malware groups, enabling you to take proactive measures in securing your enterprise against evolving threats.
  • Prioritize your prevention and detection actions for malware families identified by the malware map.
  • Prioritize vulnerability patching, based on the association with a priority malware family as presented by the malware map

Successful completion of this pathway is eligible for .5 CPE credit from ISC2.

Please note: the Recorded Future Platform is constantly being updated and refined; images presented within this course may not reflect what is currently shown in the platform.

Curriculum00:19:00

  • Malware Threat Map: Use Cases 00:15:00
  • Survey 00:02:00
  • ISC2 CPE Submission 00:02:00