{"id":149,"date":"2021-02-01T17:43:56","date_gmt":"2021-02-01T17:43:56","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/?page_id=149"},"modified":"2024-06-26T17:01:16","modified_gmt":"2024-06-26T17:01:16","slug":"frameworks","status":"publish","type":"page","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/","title":{"rendered":"Frameworks for Cyber Threat Analysis"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">&nbsp;<\/h3>\n\n\n\n<h2 class=\"wp-block-heading has-text-color has-link-color wp-elements-bdecd904fbd337bd6a2dd8ae15a5d1b0\" style=\"color:#0e2899\"><span style=\"color: #0000ff;\">Threat Analysis Frameworks<\/span><\/h2>\n\n\n\n<p>The cyber threat hunters of today need to understand not only the tradecraft of computer science, information technology, cybersecurity, political science, history, and public affairs (among other disciplines), but also traditional intelligence practices.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright\"><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/02\/braindata-370x290-1.png\" alt=\"\" class=\"wp-image-467 lazyload\"\/><noscript><img fetchpriority=\"high\" decoding=\"async\" width=\"370\" height=\"290\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/02\/braindata-370x290-1.png\" alt=\"\" class=\"wp-image-467 lazyload\" srcset=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/02\/braindata-370x290-1.png 370w, https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/02\/braindata-370x290-1-300x235.png 300w\" sizes=\"(max-width: 370px) 100vw, 370px\" \/><\/noscript><\/figure>\n<\/div>\n\n\n<p>Although our focus here is on the protection of civilian critical infrastructure, it is still important for us to draw from and use the models and cognitive frameworks that have been developed through years of disciplined practice within the intelligence and defense industries.<\/p>\n\n\n\n<p>Mental models, cognitive frameworks \u2013 or paradigms \u2013 are simply ways of looking at and understanding the world. They create our expectations for how the world works. They are sometimes culturally relative and can be rooted in tradition, heritage, and even genetics. They can be something as specific as traffic laws or social etiquette. Or they can be as general as the overarching principles of an organization or a field of study like psychology, history, the laws and theories of science and math, and military doctrines on the rules of engagement.<\/p>\n\n\n\n<p>In this training module we introduce you to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The Diamond Model<\/li>\n\n\n\n<li>The Kill Chain<\/li>\n\n\n\n<li>They Pyramid of Pain<\/li>\n\n\n\n<li>The Hunting Maturity Model<\/li>\n\n\n\n<li>The OODA Loop<\/li>\n\n\n\n<li>The Threat Agent Library<\/li>\n<\/ul>\n\n\n\n<p><em><strong>Learn about six of the key frameworks used by analysts today<\/strong><\/em>. <strong><em>Press the orange Launch button to take the self-directed training module.<\/em><\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n<p><a target=\"_blank\" href=\"\/wp-content\/uploads\/articulate_uploads\/intelligence-analysis-frameworks-scorm12-CsPMLJC6\/scormdriver\/indexAPI.html\"><img decoding=\"async\" class=\"lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/plugins\/insert-or-embed-articulate-content-into-wordpress-premium\/launch_presentation.gif\" alt=\"Launch Presentation\" \/><noscript><img decoding=\"async\" class=\"lazyload\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/plugins\/insert-or-embed-articulate-content-into-wordpress-premium\/launch_presentation.gif\" alt=\"Launch Presentation\" \/><\/noscript><\/a>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p>Material released under the terms of the <a rel=\"noreferrer noopener\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/creative-commons-license\/\" target=\"_blank\">Creative Commons<\/a>, Attribution-ShareAlike (CC BY-SA) License, Version 4.0.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/03\/by-sa-e1614634908497.png\" alt=\"\" class=\"wp-image-478 lazyload\"\/><noscript><img decoding=\"async\" width=\"203\" height=\"71\" src=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/03\/by-sa-e1614634908497.png\" alt=\"\" class=\"wp-image-478 lazyload\"\/><\/noscript><\/figure>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>&nbsp; Threat Analysis Frameworks The cyber threat hunters of today need to understand not only the tradecraft of computer science, information technology, cybersecurity, political science, history, and public affairs (among other disciplines), but also traditional intelligence practices. Although our focus here is on the protection of civilian critical infrastructure, it is still important for us [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":467,"parent":126,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_theme","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"class_list":["post-149","page","type-page","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Threat Analysis Frameworks The cyber threat hunters of today need to understand not only the tradecraft of computer science, information technology, cybersecurity, political science, history, and public affairs (among other disciplines), but also traditional intelligence practices. Although our focus here is on the protection of civilian critical infrastructure, it is still important for us\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Frameworks for Cyber Threat Analysis - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"Threat Analysis Frameworks The cyber threat hunters of today need to understand not only the tradecraft of computer science, information technology, cybersecurity, political science, history, and public affairs (among other disciplines), but also traditional intelligence practices. Although our focus here is on the protection of civilian critical infrastructure, it is still important for us\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-02-01T17:43:56+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-26T17:01:16+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Frameworks for Cyber Threat Analysis - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Threat Analysis Frameworks The cyber threat hunters of today need to understand not only the tradecraft of computer science, information technology, cybersecurity, political science, history, and public affairs (among other disciplines), but also traditional intelligence practices. Although our focus here is on the protection of civilian critical infrastructure, it is still important for us\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/frameworks\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/#listItem\",\"name\":\"Services\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/#listItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/#listItem\",\"name\":\"Training\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/#listItem\",\"position\":3,\"name\":\"Training\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/frameworks\\\/#listItem\",\"name\":\"Frameworks for Cyber Threat Analysis\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/#listItem\",\"name\":\"Services\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/frameworks\\\/#listItem\",\"position\":4,\"name\":\"Frameworks for Cyber Threat Analysis\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/#listItem\",\"name\":\"Training\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/frameworks\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/frameworks\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/frameworks\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/frameworks\\\/\",\"name\":\"Frameworks for Cyber Threat Analysis - CTIN\",\"description\":\"Threat Analysis Frameworks The cyber threat hunters of today need to understand not only the tradecraft of computer science, information technology, cybersecurity, political science, history, and public affairs (among other disciplines), but also traditional intelligence practices. Although our focus here is on the protection of civilian critical infrastructure, it is still important for us\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/frameworks\\\/#breadcrumblist\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/braindata-370x290-1.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/frameworks\\\/#mainImage\",\"width\":370,\"height\":290,\"caption\":\"Abstract image of brain with electrical cuircuits\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/services\\\/training\\\/frameworks\\\/#mainImage\"},\"datePublished\":\"2021-02-01T17:43:56+00:00\",\"dateModified\":\"2024-06-26T17:01:16+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Frameworks for Cyber Threat Analysis - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Frameworks for Cyber Threat Analysis - CTIN","description":"Threat Analysis Frameworks The cyber threat hunters of today need to understand not only the tradecraft of computer science, information technology, cybersecurity, political science, history, and public affairs (among other disciplines), but also traditional intelligence practices. Although our focus here is on the protection of civilian critical infrastructure, it is still important for us","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/#listItem","name":"Services"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/#listItem","position":2,"name":"Services","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/#listItem","name":"Training"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/#listItem","position":3,"name":"Training","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/#listItem","name":"Frameworks for Cyber Threat Analysis"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/#listItem","name":"Services"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/#listItem","position":4,"name":"Frameworks for Cyber Threat Analysis","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/#listItem","name":"Training"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/","name":"Frameworks for Cyber Threat Analysis - CTIN","description":"Threat Analysis Frameworks The cyber threat hunters of today need to understand not only the tradecraft of computer science, information technology, cybersecurity, political science, history, and public affairs (among other disciplines), but also traditional intelligence practices. Although our focus here is on the protection of civilian critical infrastructure, it is still important for us","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/#breadcrumblist"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/02\/braindata-370x290-1.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/#mainImage","width":370,"height":290,"caption":"Abstract image of brain with electrical cuircuits"},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/#mainImage"},"datePublished":"2021-02-01T17:43:56+00:00","dateModified":"2024-06-26T17:01:16+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Frameworks for Cyber Threat Analysis - CTIN","og:description":"Threat Analysis Frameworks The cyber threat hunters of today need to understand not only the tradecraft of computer science, information technology, cybersecurity, political science, history, and public affairs (among other disciplines), but also traditional intelligence practices. Although our focus here is on the protection of civilian critical infrastructure, it is still important for us","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2021-02-01T17:43:56+00:00","article:modified_time":"2024-06-26T17:01:16+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Frameworks for Cyber Threat Analysis - CTIN","twitter:description":"Threat Analysis Frameworks The cyber threat hunters of today need to understand not only the tradecraft of computer science, information technology, cybersecurity, political science, history, and public affairs (among other disciplines), but also traditional intelligence practices. Although our focus here is on the protection of civilian critical infrastructure, it is still important for us","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"149","title":null,"description":null,"keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"WebPage","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:47:07","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2021-08-07 21:51:10","updated":"2025-08-25 22:47:07"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/\" title=\"Services\">Services<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/\" title=\"Training\">Training<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tFrameworks for Cyber Threat Analysis\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Services","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/"},{"label":"Training","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/"},{"label":"Frameworks for Cyber Threat Analysis","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/services\/training\/frameworks\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/pages\/149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":13,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/pages\/149\/revisions"}],"predecessor-version":[{"id":4767,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/pages\/149\/revisions\/4767"}],"up":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/pages\/126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/467"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}