Description
Price: 5.00 USD | Size: 447 MB | Duration : 4.12 Hours | 37 Video Lessons | Bonus : Cyber Threat Intelligence PDF Guides
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD | 4.9
Course details
Do you want to take your cyber threat intelligence skills to the next level so you can better protect your organization? In this advanced cyber threat intelligence course, learn to leverage existing data sources, reduce false positives, and use models like the Cyber Kill Chain and the MITRE ATT&CK framework to structure your analysis. Go over internal data acquisition, as well as external, private, community, and public data sources, and learn how to leverage OSINT. Explore data processing, including common CTI standards, storage, integration, and threat intelligence platforms. Get a thorough introduction to analysis with Cyber Kill Chain, the diamond model, and the courses of action matrix. Explore campaign analysis and attribution. Plus, dive into dissemination and tactical, operational, and strategic intelligence.
Contents
-
Contents
-
-
Course introduction7m 50s
-
Introduction to the intelligence lifecycle7m 9s
-
-
-
Introduction to data collection4m 11s
-
Internal data acquisition6m 38s
-
External data sources7m 7s
-
Private data sources part 18m 37s
-
Private data sources part 23m 42s
-
Community data sources10m 48s
-
Public data sources part 18m
-
Public data sources part 23m 12s
-
Leveraging OSINT part 19m 22s
-
Leveraging OSINT part 26m 50s
-
-
-
Introduction to data processing6m 14s
-
Common CTI standards part 18m 1s
-
Common CTI standards part 24m 1s
-
Storage and integration2m 24s
-
Threat intelligence platforms9m 12s
-
-
-
Introduction to analysis4m 50s
-
Analysis of competing hypothesis7m 32s
-
Cyber kill chain and diamond model10m 45s
-
Cyber kill chain and courses of action matrix9m 11s
-
-
-
Introduction to campaigns4m 58s
-
Heatmap analysis6m 2s
-
Visual analysis6m 16s
-
MITRE ATT&CK and the MITRE threat groups track7m 28s
-
Threat intelligence naming conventions7m 21s
-
-
-
Introduction to attribution7m 50s
-
Cognitive biases6m 9s
-
Logical fallacies6m 32s
-
How to manage biases5m 20s
-
Nation-state attribution part 17m 53s
-
Nation-state attribution part 24m 34s
-
-
-
Introduction to dissemination7m 12s
-
Tactical intelligence7m 28s
-
Operational intelligence5m 36s
-
Strategic intelligence9m 21s
-
-
-
Summary6m 28s
-
What’s included
-
Bonus : Cyber Threat Intelligence PDF Guides
Discover more from Easy Learning (Since 2013)
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.