• Types of threat intelligence feeds and sources.
  • Data collection methods, including OSINT and HUMINT.
  • Processing and exploiting collected data.