• Definition and essential terminology.
  • Intelligence vs. information vs. data.
  • Integrating threat intelligence into security operations.