back to top

UC – Cyber Threat Intelligence (CTI)

Jennifer Funk, a CTI Operations Manager at a Fortune 500 company, introduces Cyber Threat Intelligence (CTI), explaining its purpose, key stakeholders, and how it transforms raw data into actionable insights. Learners will explore where CTI data comes from, including OSINT, dark web monitoring, internal logs, and threat intelligence feeds, and how this information is used to detect, prevent, and mitigate cyber threats.

By the end of this UC, learners will understand how CTI supports security teams, incident response, and strategic decision-making—building a solid foundation for anyone interested in building or joining a CTI team.

Price = FREE!

What’s an Upskill Challenge (UC)?

A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as “friends” of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.

A UC should be 10 – 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.

Prerequisites for “UC – CTI”

UCs assume no knowledge at all! They’re meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.


Available NOW

ConDef 2026 with AI Teaching Asst
20% Launch Discount = Only $400
Expires Mid ET Jan 31


Add WinMalDev to Your Arsenal!

- WMD 1 = NameYourPrice Only $40
WMD Intro Path (1 - 3) = 46% Off
Expires Mid ET Jan 31


Recent Releases

- WMD 5, SIEMless Threat Hunting
- 2 New Bundles 50% Off 7 CTFs, 75% Off 7 HALs
- Blogs: Brief History of ConDef EcosystemConDef MCP – Meet Your AI Teaching Asst, Blue Team Training Roadmap
- Free Upskill Challenges: Home Lab, Nmap, PowerShell


Top Picks

- The Mishaal Bundle
- API Hacking by Katie Paxton-Fear
- MADS - Mastering AD Security Vols 1 - 3 by Slavi Parpulev


Courses In Production

WMD 6, WebApp Pentest, Network Pentest, Deception, OS Hardening, Hardware Hacking 101, Dark Web 2...