Skip to main content
Print this chapter
Chapter 2 Exploring Cybersecurity Threats
2. Threat Data and Intelligence
Audio
https://lms.theapexprogram.com/pluginfile.php/294/mod_book/chapter/813/Audio%20Recording%20Apr%2028%2C%202024%20at%20111941%E2%80%AFPM.m4a
Transcript
So let's get into Section 2 of Chapter 2, and that is threat data and intelligence.