top of page
Applied threat intelligence





2 days


Online / Offline 


Basic / Intermediate 

Applied threat intelligence. Aguilar & Diaz


Virginia Aguilar & Vicente Diaz

About the training: 

Virginia Aguilar boasts more than 15 years of experience in the field of cybersecurity, specializing in threat intelligence, digital forensics and incident response.

Virginia is currently leading the T&S Account Security team at Google, where she contributes to the continued development of Google Account protection. Prior to joining Google, she led the Coordination Centre of the NATO Computer Incident Response Capability and designed its Cyber Threat Assessment Cell.

Vicente Diaz is a specialist in Threat Intelligence and Threat Hunting. He works in the VirusTotal team in Google as Threat Intelligence Strategist. He holds a degree in Computer Science and an MsC in Artificial Intelligence. He was e-crime manager in S21sec for 5 years and deputy director for EU in Kaspersky's Global Research and Analysis team for almost 10 years, where he was co-creator and responsible for the APT Intelligence Reporting service.

Threat Intelligence has its roots in traditional intelligence analysis. It is one of the best tools for understanding and dealing with the ever-growing complexity of the threat landscape; unfortunately, it is usually poorly used or understood.

This elite training by industry experts shows in a realistic and applied way how to get the most from threat intelligence. Attendees will learn how to collect, analyze and use threat intelligence-related data, tools and frameworks. They will gain unique experience from our trainers, with real-life and very hands-on scenarios showing how to effectively conduct threat hunting and incident response, as well as how to apply the insights to protect a particular network.

Training is offered under two modalities: Hunting and Defending. Each provides the most valuable insights and best practices, tools, frameworks and effective tips in hands-on scenarios related to the modality of your choice.

Key takeaways:

  • Understand how to distill a huge volume of data and transform it into intelligence

  • Threat hunting and adversary profiling

  • Threat intelligence frameworks and sources of data

  • Ability to use all this data in different scenarios for defending, IR and forensic analysis

What you get after the training:

  • itrainsec shareable certificate, signed by the trainer (add it to your LinkedIn profile) 

  • Course materials 

  • Practical skill to elevate your career to the next level 

  • After-training consultancy and support 

  • Expansion of your professional network in the cybersecurity industry 

  • Stronger cybersecurity posture of your business

bottom of page