UC Tech Academy: Applied Intelligence Mentorship Program

Participants will learn the fundamentals of cyber intelligence and cyber risk; how to build and lead a cyber threat intelligence program; cyber threats and intrusion (CTI) sets; communicating threat intelligence analysis effectively; how to collect, extract, store, and analyze cyber threat information; the cyber threat profile and Cyber Threat Intelligence (CTI) frameworks; threat enrichment and attribution analysis; and cyber threat feeds, automation, and Indicator of Compromise (IOC) aging.

Key Facts 

  • Program Name: UC Tech Academy: Applied Intelligence Mentorship Program
  • Target audience and nomination process: UC Cyber Threat Intelligence practitioners who are nominated by chief information officers each year
  • Timing: Eight-month program with monthly modules
  • Format and location: Virtual program consists of monthly modules or workshops, each addressing a different topic and taking about 12 hours each month
  • Sponsor: Van Williams and the UC CIO Council
  • Contact: Kristin Cordova (see contact details, below)

Program Details

Target audience and nomination process

Twelve individuals across UC locations who are cyber threat intelligence practitioners who are selected based on their ability to benefit from the program. The process for candidate nomination is managed locally by each CIO Council representative, based on the following criteria: (1) the positions own the Cyber Threat Intelligence (CTI) function, or who work in related CTI functions, including incident response, the security operations center or risk management; (2) at least three years of experience working in a CTI related role; (3) comfort with representing their CTI team and sharing atmospherics, insights, existing workflows, processes and previously produced products.

Program learning objectives

Participants will learn the fundamentals of cyber intelligence and cyber risk; how to build and lead a cyber threat intelligence program; cyber threats and intrusion (CTI) sets; communicating threat intelligence analysis effectively; how to collect, extract, store, and analyze cyber threat information; the cyber threat profile and Cyber Threat Intelligence (CTI) frameworks; threat enrichment and attribution analysis; and cyber threat feeds, automation, and Indicator of Compromise (IOC) aging.

Format and location

This eight-month virtual program consists of monthly modules or workshops, each addressing a different topic and requiring about twelve hours of commitment. The location is virtual. To learn more about upcoming programs, please contact us.

About the UC Tech Academy

This program is part of the UC Tech Academy, a suite of professional development programs for the UC Tech community. These programs support a range of job levels, and are generally open to the entire UC Tech community, consisting of professionals across the university who work in IT. Each program has specific nomination/application processes and criteria.

Contact

UC Tech Academy Program Director
Kristin Cordova
Kristin.Cordova@ucop.edu