1. The Making of a simple Cyber Threat Intelligence Gathering System Using open-source information gathering to create your own Cyber Threat Intelligence gathering system.…