We use cookies to ensure you get the best experience on our website. Please review our cookie policy for details.

Practical Cyber Threat Intelligence

Lessons
Lab
TestPrep
AI Tutor (Hinzufügen Auf)
Holen Sie sich eine kostenlose Testversion

Über diesen Kurs

Fähigkeiten, die Sie erwerben werden

1

Preface

2

Basics of Threat Analysis and Modeling

  • Introduction
  • Defining threat modelling
  • Understanding the threat modelling process
  • Threat modelling methodologies
  • Conclusion
  • Further Reading
3

Formulate a Threat Intelligence Model

  • Introduction
  • Understanding threat intelligence
  • Defining bad intelligence
  • Comparing good and bad intelligence
  • Contrasting good from bad intelligence
  • Good and bad intelligence shapes threat modeling
  • Keepnet Threat Intelligence Sharing Community (TISC)
  • Detailed description
  • Conclusion
  • Further reading
4

Adversary Data Collection Sources & Methods

  • Introduction
  • Adversary-based threat modelling
  • Understanding our organizations
  • Understanding our adversaries
  • Adversary playbook
  • Hands-On MITRE ATT&CK
  • MITRE ATT&CK Use Cases
  • Conclusion
  • Further reading
5

Pivot Off and Extracting Adversarial Data

  • Introduction
  • Setting up a mitigation plan
  • Budgeting for the incident response events
  • Taking the necessary precautions
  • Conclusion
  • Incident Response
  • Execution of Malware
  • Configuration
  • Conclusion
  • Data Exfiltration Analysis
  • Summary & Findings
  • Further reading
6

Primary Indicators of Security Compromise

  • Introduction
  • Common indicators of compromise
  • Challenges of IOCs
  • Tactics, Techniques, and Procedures (TTP)
  • Summary
  • Further reading
7

Identify & Build Indicators of Compromise

  • Introduction
  • Data correlation
  • Creating system log entry files data
  • Creating anomalies in privileged user account activity
  • LAB: Data Collection
  • Key Windows Services
  • Conclusion
  • Further reading
8

Conduct Threat Assessments In Depth

  • Introduction
  • Malware analysis
  • SQL injections analysis
  • Conclusion
  • Further reading
9

Produce Heat Maps, Infographics & Dashboards

  • Introduction
  • Understanding a heat map
  • 2D density plots
  • When to use heat maps
  • Best practices for using heat maps
  • Common heat map options
  • Visualization tools
  • Conclusion
  • Further Reading
10

Build Reliable & Robust Threat Intelligence System

  • Introduction
  • Conclusion
  • Further reading
11

Learn Statistical Approaches for Threat Intelligence

  • Introduction
  • Data preparation
  • Data classification
  • Data validation
  • Data correlation
  • Data scoring
  • Summary
  • Further reading
12

Develop Analytical Skills for Complex Threats

  • Introduction
  • Understanding analytical skills
  • Identifying common threats and learning how they work
  • Distributed Denial-of-Service (DDoS) attacks
  • Identifying threat objectives
  • Identifying threat mitigation methods and tools
  • Researching on New Threats and Changing Threats Landscape
  • Understanding Various Organizations and Assets That May Be Targeted
  • Understanding Adversary Attack Vectors and Various Vulnerabilities
  • Conclusion
  • Further reading
13

Planning for Disaster

  • Introduction
  • Defining APTS
  • Zero-day vulnerabilities
  • Defining zero-day threats
  • Planning against APT attacks
  • Summary
  • Further reading

Practical Cyber Threat Intelligence

$ 239.99

Kaufe jetzt

Ähnliche Kurse

Alle Kurse
Scrolle nach oben