arcX - Cyber Threat Intelligence Practitioner
Focused View
15:20:06
0 View
001. Welcome.mp4
02:15
004. What is Cyber Threat Intelligence.mp4
09:02
005. Cyber Threat Intelligence in Context.mp4
06:03
006. Whats in a Name.mp4
19:21
007. How Organisations Use CTI.mp4
14:35
008. The Role of a CTI Analyst.mp4
03:07
010. Introducing Threat Actors.mp4
00:52
011. Grey, White and Black Hat Hackers.mp4
04:03
012. Breaking Down Black Hat Hackers.mp4
19:49
013. Threat Vector Types and Vulnerabilities.mp4
29:46
014. The Intelligence Cycle.mp4
10:54
015. Analytic Models.mp4
23:33
017. Operational Lifecycle.mp4
03:34
018. Cyber Kill Chain.mp4
26:34
019. Diamond Model and Cyber Kill Chain.mp4
12:02
022. Key Terminology.mp4
19:59
023. The Products of a Risk Assessment.mp4
17:08
026. Terms of Reference.mp4
07:12
027. Introducing Intelligence Requirements.mp4
25:56
029. The Importance of Project Review.mp4
10:53
031. Intelligence Gaps and How to Deal With Them.mp4
08:50
032. SandA to PIRs.mp4
10:45
035. Introduction to Collection.mp4
06:38
036. Use of a Collection Worksheet.mp4
03:17
038. Introduction to Types of Sources.mp4
33:50
039. Integrating Sources with the Collection Worksheet.mp4
05:14
041. Sources, Reliability and Grading.mp4
17:28
043. Introducing CTI Specific Sources.mp4
36:07
044. Pivoting.mp4
09:24
045. The Power of Tools.mp4
09:28
046. A Closer Look at Maltego.mp4
14:07
047. Choosing the Right Tools.mp4
11:24
049. Introducing Basic Source Analysis.mp4
44:52
050. Deliberate Misdirection.mp4
09:36
052. Google Searching.mp4
17:00
053. Proprietary Products.mp4
08:48
055. Operational Security Basics.mp4
30:34
056. Striking the Balance Between OPSEC and CTI.mp4
08:43
060. Introducing Hypothesis Generation and Testing.mp4
02:19
061. Analysis of Competing Hypothesis - ACH.mp4
33:20
064. Understanding Information Reliability.mp4
24:49
065. Information Reliability Summarised.mp4
04:25
066. Expressing the Likelihood of Certainty.mp4
19:36
067. Circular Reporting.mp4
14:01
069. Bias in Detail.mp4
12:07
070. Data Analysis and Handling Errors .mp4
12:03
071. Analytical Techniques.mp4
30:50
073. Structured Machine Readable.mp4
26:14
074. Unstructured Human Readable.mp4
22:03
075. Intelligence Sharing.mp4
19:40
078. Applying Law and Ethics to CTI.mp4
13:18
079. Law and Ethics in Practice .mp4
17:12
080. Handling Classified Information .mp4
38:23
082. Key Legislation Introduction.mp4
04:40
083. Data Protection Act.mp4
06:10
084. Computer Misuse Act.mp4
05:13
085. Police and Justice Act.mp4
05:30
086. Bribery Act.mp4
03:30
087. Regulation of Investigative Powers Act .mp4
04:31
088. Proceeds of Crime Act.mp4
03:27
089. Official Secrets Act.mp4
02:31
090. Telecommunications Act.mp4
03:01
091. Human Rights Act.mp4
04:59
093. Dealing with Legal and Ethical Uncertainty.mp4
18:53
094. CREST Code of Conduct.mp4
14:38
More details
User Reviews
Rating
average 0
Focused display
Category

Udemy
View courses UdemyStudents take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
- language english
- Training sessions 65
- duration 15:20:06
- Release Date 2025/01/22