# Intro to ISAC

- [Introduction](/defense/threat-and-vulnerability-management/intro-to-isac/introduction.md)
- [Basic Terminology](/defense/threat-and-vulnerability-management/intro-to-isac/basic-terminology.md)
- [What is Threat Intelligence?](/defense/threat-and-vulnerability-management/intro-to-isac/what-is-threat-intelligence.md)
- [What are ISACs?](/defense/threat-and-vulnerability-management/intro-to-isac/what-are-isacs.md)
- [Using Threat Connect to create a Threat Intel dashboard](/defense/threat-and-vulnerability-management/intro-to-isac/using-threat-connect-to-create-a-threat-intel-dashboard.md)
- [Introduction to AlienVault OTX](/defense/threat-and-vulnerability-management/intro-to-isac/introduction-to-alienvault-otx.md)
- [Using OTX to gather Threat Intelligence](/defense/threat-and-vulnerability-management/intro-to-isac/using-otx-to-gather-threat-intelligence.md)
- [Creating IOCs](/defense/threat-and-vulnerability-management/intro-to-isac/creating-iocs.md)
- [Investigating IOCs](/defense/threat-and-vulnerability-management/intro-to-isac/investigating-iocs.md)
- [Answers](/defense/threat-and-vulnerability-management/intro-to-isac/investigating-iocs/untitled.md)
