CSE730

Threat Intelligence and Incident Response
Post-graduate Program

CSE730: Threat Intelligence and Incident Response

Offered: Fall 2025 (current)

Incident response process (Preparation, Identification Containment, Eradication, Recovery, Lessons learned), Network Evidence Acquisition, log aggregation and analysis, various log formats, Elastic stack, Security Operations and Forensics ELK (SOF-ELK), NetFlow analysis, Open-source flow analysis tools, Network traffic analysis, Moloch – Network forensics and analysis tool.

Course Objectives

The core objectives of this course are to:
Integrate threat intelligence (TI) into all phases of the incident response (IR) lifecycle.
Analyze network evidence (logs, NetFlow, packet captures) using tools like Elastic Stack, Moloch, and SOF-ELK.
Apply frameworks (MITRE ATT&CK, Cyber Kill Chain) to model adversary behavior and refine detection strategies
Develop technical skills for threat hunting, forensic investigations, and real-time incident triage
Foster independent research capabilities in cyber threat intelligence and incident handling, preparing students for leadership roles in cybersecurity.

List of Books

1. To Be Added

Course Outcome

# Description Weight Edit

Course Coordinator

Dr. Md Sadek Ferdous


©2025 BracU CSE Department