Conduct cyber threats intelligence by collecting, analysing, and interpreting data about potential cyber threats. Leverage various sources of information such as open-source intelligence (OSINT), social media, or dark web services.
Data Source: Unified Global Standards (ISCED, ISCO, O*NET, ESCO)