Companies Home Search Profile

Advanced Cyber Threat Intelligence

Focused View

Cybrary

4:12:04

71 View
  • 01 - Course introduction.mp4
    07:50
  • 02 - Introduction to the intelligence lifecycle.mp4
    07:09
  • 01 - Introduction to data collection.mp4
    04:11
  • 02 - Internal data acquisition.mp4
    06:38
  • 03 - External data sources.mp4
    07:07
  • 04 - Private data sources part 1.mp4
    08:37
  • 05 - Private data sources part 2.mp4
    03:42
  • 06 - Community data sources.mp4
    10:48
  • 07 - Public data sources part 1.mp4
    08:00
  • 08 - Public data sources part 2.mp4
    03:12
  • 09 - Leveraging OSINT part 1.mp4
    09:22
  • 10 - Leveraging OSINT part 2.mp4
    06:50
  • 01 - Introduction to data processing.mp4
    06:14
  • 02 - Common CTI standards part 1.mp4
    08:01
  • 03 - Common CTI standards part 2.mp4
    04:01
  • 04 - Storage and integration.mp4
    02:24
  • 05 - Threat intelligence platforms.mp4
    09:12
  • 01 - Introduction to analysis.mp4
    04:50
  • 02 - Analysis of competing hypothesis.mp4
    07:32
  • 03 - Cyber kill chain and diamond model.mp4
    10:45
  • 04 - Cyber kill chain and courses of action matrix.mp4
    09:11
  • 01 - Introduction to campaigns.mp4
    04:58
  • 02 - Heatmap analysis.mp4
    06:02
  • 03 - Visual analysis.mp4
    06:16
  • 04 - MITRE ATT&CK and the MITRE threat groups track.mp4
    07:28
  • 05 - Threat intelligence naming conventions.mp4
    07:21
  • 01 - Introduction to attribution.mp4
    07:50
  • 02 - Cognitive biases.mp4
    06:09
  • 03 - Logical fallacies.mp4
    06:32
  • 04 - How to manage biases.mp4
    05:20
  • 05 - Nation-state attribution part 1.mp4
    07:53
  • 06 - Nation-state attribution part 2.mp4
    04:34
  • 01 - Introduction to dissemination.mp4
    07:12
  • 02 - Tactical intelligence.mp4
    07:28
  • 03 - Operational intelligence.mp4
    05:36
  • 04 - Strategic intelligence.mp4
    09:21
  • 01 - Summary.mp4
    06:28
  • Description


    Do you want to take your cyber threat intelligence skills to the next level so you can better protect your organization? In this advanced cyber threat intelligence course, learn to leverage existing data sources, reduce false positives, and use models like the Cyber Kill Chain and the MITRE ATT&CK framework to structure your analysis. Go over internal data acquisition, as well as external, private, community, and public data sources, and learn how to leverage OSINT. Explore data processing, including common CTI standards, storage, integration, and threat intelligence platforms. Get a thorough introduction to analysis with Cyber Kill Chain, the diamond model, and the courses of action matrix. Explore campaign analysis and attribution. Plus, dive into dissemination and tactical, operational, and strategic intelligence.

    This course was created by Cybrary. We are pleased to host this training in our library.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 37
    • duration 4:12:04
    • English subtitles has
    • Release Date 2023/11/16