Getting started with threat intelligence and hunting


Domain knowledge and understanding in adopting practices, methods and tools that relates to the activities performed in cyber threat hunting.

IBM SkillsBuild for Academia
Self-paced course

Getting started threat intelligence hunting

Foundational course, exposing the learner to the basics of Cybersecurity, with a focus on threat intelligence.

Looking for a job?

Gain new cybersecurity skills, complement them with your expertise, and join a new wave of safe-tech professionals with access to millions of jobs available in the market.

Looking for a better job?

Explore newer tech trends, gain industry insights, and start your journey to become a Threat Intelligence Analyst or a Threat Hunter!


Insight into the current threat intelligence challenges faced by an enterprise, and a general understanding of the threat intelligence practices and tools available in the market.


  • Attack trends per geography
  • Threat intelligence concepts
  • Threat intelligence tools
  • Real-world use cases

Learning outcomes:

  • Get exposed to the cyber threats landscape, exploring how cyber attacks affect organizations across different industries and identify patterns for attack trends around the world.
  • Engage in practical activities, utilizing cloud-based enterprise threat intelligence solutions such as IBM X-Force Exchange, to monitor in real-time events happening across different geographies and get alerts of incidents relevant to the enterprise security profile.
  • Get familiar with cyber attack adversarial frameworks used by cyber criminal networks and evaluate approaches to proactively address these attacks by leveraging threat-hunting techniques.
  • Learn to install and use threat intelligence tools used by threat hunters such as IBM i2 Intelligence Notebook to enable organizations to thwart attacks from cybercrime organizations.

Course experience

About this course

This foundational course is divided into three practice levels. It exposes the learner to threat intelligence concepts. Each level covers more advanced topics and builds on the concepts, practice, and skills addressed in previous practice levels.

Level 1 — Global threat trends

Analyze top cyber attack trends per industry and identify cyber protection techniques.

  1. 1. Threat intelligence overview
  2. 2. Global panorama of cyber threats
  3. 3. Threat intelligence activity map
  4. 4. Cyber attacks anatomy

Level 2 — Threat intelligence

Explore traditional IT security practices and attacker entry points to an organization.

  1. 1. Threat intelligence approaches
  2. 2. Hospital threats and scenario
  3. 3. Hospital phishing attack – episode I
  4. 4. X-Force Exchange world threat map

Level 3 — Threat hunting

Validate the impact of access controls, data breaches, and application vulnerability scans.

  1. 1. Security operation centers
  2. 2. Threat hunting
  3. 3. Hospital phishing attack – episode II
  4. 4. I2 phishing scenario


Skills you will need to have before joining this course offering.

  • Basic IT Literacy skills*

*Basic IT Literacy — Refers to skills required to operate at the user level a graphical operating system environment such as Microsoft Windows® or Linux Ubuntu®, performing basic operating commands such as launching an application, copying and pasting information, using menus, windows, and peripheral devices such as mouse and keyboard. Additionally, users should be familiar with internet browsers, search engines, page navigation, and forms.

Digital credential


Getting Started with Threat Intelligence and Hunting Badge

Getting started with threat intelligence and hunting

See badge

About this badge

This badge earner has completed all the learning activities included in this online learning experience, including hands-on experience, concepts, methods, and tools related to the threat intelligence and hunting domain. The individual has demonstrated domain knowledge and understanding in adopting practices, methods, and tools that relates to the activities performed in cyber threat hunting.


Attack frameworks, Cybersecurity, Data breaches, Healthcare security, IBM i2, Phishing, Threat Hunting, Threat Intelligence, Threat landscape X-Force exchange.


  • Complete the self-paced online course Getting Started with Threat Intelligence and Hunting, which is made available in the IBM Academic Initiative portal.
  • Pass the final course assessment.