OODA Loop in Cyber Threat Intelligence

Photo by Somruthai Keawjan on Unsplash

OODA Loop Steps

Observe

Orient

Decide

Act

Battle of the OODA Loops

Additional Resources

--

--

--

Cyber threat intelligence (CTI), cybersecurity, & privacy enthusiast. Seeking a CTI job. Bookworm. Fan of Tolkien & LEGO.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

What’s the Difference between Deep Web and Dark Web?

LinkedIn, my baby step into cyber security career

Baby Step Crawl Towards Cyber Security Career

SynAssets is always the best crypto space to be.

How to buy NFT’s without any risks?

how to buy nfts without any risks banner

Say goodbye to iOS spammers

The History of Six Commercial Security Systems

Security Tips for Engineers

Google Dorks - A Tracker

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Chad Warner

Chad Warner

Cyber threat intelligence (CTI), cybersecurity, & privacy enthusiast. Seeking a CTI job. Bookworm. Fan of Tolkien & LEGO.

More from Medium

Intelligence Requirements in Cyber Threat Intelligence

SOC Tool Kit v2.1: Building an Effective Cyber Defense Line in Organizations

Threat Intelligence lead content creation

OSINT: Open Source Intelligence