Practical Cyber Threat Intelligence

Lessons
Lab
TestPrep
AI Tutor (Add-on)
Get A Free Trial

About This Course

Skills You’ll Get

1

Preface

2

Basics of Threat Analysis and Modeling

  • Introduction
  • Defining threat modelling
  • Understanding the threat modelling process
  • Threat modelling methodologies
  • Conclusion
  • Further Reading
3

Formulate a Threat Intelligence Model

  • Introduction
  • Understanding threat intelligence
  • Defining bad intelligence
  • Comparing good and bad intelligence
  • Contrasting good from bad intelligence
  • Good and bad intelligence shapes threat modeling
  • Keepnet Threat Intelligence Sharing Community (TISC)
  • Detailed description
  • Conclusion
  • Further reading
4

Adversary Data Collection Sources & Methods

  • Introduction
  • Adversary-based threat modelling
  • Understanding our organizations
  • Understanding our adversaries
  • Adversary playbook
  • Hands-On MITRE ATT&CK
  • MITRE ATT&CK Use Cases
  • Conclusion
  • Further reading
5

Pivot Off and Extracting Adversarial Data

  • Introduction
  • Setting up a mitigation plan
  • Budgeting for the incident response events
  • Taking the necessary precautions
  • Conclusion
  • Incident Response
  • Execution of Malware
  • Configuration
  • Conclusion
  • Data Exfiltration Analysis
  • Summary & Findings
  • Further reading
6

Primary Indicators of Security Compromise

  • Introduction
  • Common indicators of compromise
  • Challenges of IOCs
  • Tactics, Techniques, and Procedures (TTP)
  • Summary
  • Further reading
7

Identify & Build Indicators of Compromise

  • Introduction
  • Data correlation
  • Creating system log entry files data
  • Creating anomalies in privileged user account activity
  • LAB: Data Collection
  • Key Windows Services
  • Conclusion
  • Further reading
8

Conduct Threat Assessments In Depth

  • Introduction
  • Malware analysis
  • SQL injections analysis
  • Conclusion
  • Further reading
9

Produce Heat Maps, Infographics & Dashboards

  • Introduction
  • Understanding a heat map
  • 2D density plots
  • When to use heat maps
  • Best practices for using heat maps
  • Common heat map options
  • Visualization tools
  • Conclusion
  • Further Reading
10

Build Reliable & Robust Threat Intelligence System

  • Introduction
  • Conclusion
  • Further reading
11

Learn Statistical Approaches for Threat Intelligence

  • Introduction
  • Data preparation
  • Data classification
  • Data validation
  • Data correlation
  • Data scoring
  • Summary
  • Further reading
12

Develop Analytical Skills for Complex Threats

  • Introduction
  • Understanding analytical skills
  • Identifying common threats and learning how they work
  • Distributed Denial-of-Service (DDoS) attacks
  • Identifying threat objectives
  • Identifying threat mitigation methods and tools
  • Researching on New Threats and Changing Threats Landscape
  • Understanding Various Organizations and Assets That May Be Targeted
  • Understanding Adversary Attack Vectors and Various Vulnerabilities
  • Conclusion
  • Further reading
13

Planning for Disaster

  • Introduction
  • Defining APTS
  • Zero-day vulnerabilities
  • Defining zero-day threats
  • Planning against APT attacks
  • Summary
  • Further reading

Practical Cyber Threat Intelligence

$ 386.55

Buy Now

Related Courses

All Course
scroll to top