MISP (Malware Information Sharing Platform and Threat Sharing) is an open-source threat intelligence platform that allows you to share, collate, analyze, and distribute threat intelligence. In this series you will learn how to make the most of this platform and integrate it into your CTI workflow.
Discover the premier open-source threat intelligence sharing platform, its key features, and how you can use it to elevate your security posture!
Learn how to install and set up MISP. You will discover the various installation methods available, which is best, and how to configure your MISP instance to begin ingesting threat intelligence.
Learn how to start using MISP. You will learn about MISP events, how to create them, and how to add context to them using MISP’s galaxies and taxonomies
Learn how to add open-source threat intelligence feeds to your MISP instance so you can begin rapidly populating the threat intelligence platform with the latest data.
Learn how to search and filter MISP events and attributes to find threat intelligence relevant to you.
Learn to use the MISP API to make the most of your MISP instance. You will see how to get statistics about your MISP instance, search for attributes and events, and visualize data you’ve added to your instance.
Discover how to turn MISP attributes into Indicators of Compromise that you can export as a CSV file and upload to your security solution for detection.
If you want more of a challenge, take on one of their certification exams and land your next job in cyber: