Companies Home Search Profile

arcX - Cyber Threat Intelligence Practitioner

Focused View

15:20:06

0 View
  • 001. Welcome.html
  • 001. Welcome.mp4
    02:15
  • 002. Key Concepts.html
  • 003. Objectives of Threat Intelligence.html
  • 004. What is Cyber Threat Intelligence.html
  • 004. What is Cyber Threat Intelligence.mp4
    09:02
  • 005. Cyber Threat Intelligence in Context.html
  • 005. Cyber Threat Intelligence in Context.mp4
    06:03
  • 006. Whats in a Name.html
  • 006. Whats in a Name.mp4
    19:21
  • 007. How Organisations Use CTI.html
  • 007. How Organisations Use CTI.mp4
    14:35
  • 008. The Role of a CTI Analyst.html
  • 008. The Role of a CTI Analyst.mp4
    03:07
  • 009. Threat Actor Types.html
  • 010. Introducing Threat Actors.html
  • 010. Introducing Threat Actors.mp4
    00:52
  • 011. Grey, White and Black Hat Hackers.html
  • 011. Grey, White and Black Hat Hackers.mp4
    04:03
  • 012. Breaking Down Black Hat Hackers.html
  • 012. Breaking Down Black Hat Hackers.mp4
    19:49
  • 013. Threat Vector Types and Vulnerabilities.html
  • 013. Threat Vector Types and Vulnerabilities.mp4
    29:46
  • 014. The Intelligence Cycle.html
  • 014. The Intelligence Cycle.mp4
    10:54
  • 015. Analytic Models.html
  • 015. Analytic Models.mp4
    23:33
  • 016. Attack Lifecycle.html
  • 017. Operational Lifecycle.html
  • 017. Operational Lifecycle.mp4
    03:34
  • 018. Cyber Kill Chain.html
  • 018. Cyber Kill Chain.mp4
    26:34
  • 019. Diamond Model and Cyber Kill Chain.html
  • 019. Diamond Model and Cyber Kill Chain.mp4
    12:02
  • 020. Mini Quiz.html
  • 021. Understanding Risk.html
  • 022. Key Terminology.html
  • 022. Key Terminology.mp4
    19:59
  • 023. The Products of a Risk Assessment.mp4
    17:08
  • 024. Direction.html
  • 025. Intelligence Requirements.html
  • 026. Terms of Reference.html
  • 026. Terms of Reference.mp4
    07:12
  • 027. Introducing Intelligence Requirements.html
  • 027. Introducing Intelligence Requirements.mp4
    25:56
  • 028. Mini Quiz.html
  • 029. The Importance of Project Review.html
  • 029. The Importance of Project Review.mp4
    10:53
  • 030. Intelligence Gaps.html
  • 031. Intelligence Gaps and How to Deal With Them.html
  • 031. Intelligence Gaps and How to Deal With Them.mp4
    08:50
  • 032. SandA to PIRs.mp4
    10:45
  • 033. Mini Quiz.html
  • 034. Collection.html
  • 035. Introduction to Collection.html
  • 035. Introduction to Collection.mp4
    06:38
  • 036. Use of a Collection Worksheet.html
  • 036. Use of a Collection Worksheet.mp4
    03:17
  • 037. Types of Sources.html
  • 038. Introduction to Types of Sources.html
  • 038. Introduction to Types of Sources.mp4
    33:50
  • 039. Integrating Sources with the Collection Worksheet.mp4
    05:14
  • 040. Mini Quiz.html
  • 041. Sources, Reliability and Grading.html
  • 041. Sources, Reliability and Grading.mp4
    17:28
  • 042. CTI Specific Sources.html
  • 043. Introducing CTI Specific Sources.mp4
    36:07
  • 044. Pivoting.mp4
    09:24
  • 045. The Power of Tools.mp4
    09:28
  • 046. A Closer Look at Maltego.html
  • 046. A Closer Look at Maltego.mp4
    14:07
  • 047. Choosing the Right Tools.mp4
    11:24
  • 048. Basic Source Analysis.html
  • 049. Introducing Basic Source Analysis.mp4
    44:52
  • 050. Deliberate Misdirection.mp4
    09:36
  • 051. Boolean Search Strings.html
  • 052. Google Searching.html
  • 052. Google Searching.mp4
    17:00
  • 053. Proprietary Products.mp4
    08:48
  • 054. Operational Security.html
  • 055. Operational Security Basics.mp4
    30:34
  • 056. Striking the Balance Between OPSEC and CTI.mp4
    08:43
  • 057. Mini Quiz.html
  • 058. Analysis.html
  • 059. Hypothesis Testing.html
  • 060. Introducing Hypothesis Generation and Testing.html
  • 060. Introducing Hypothesis Generation and Testing.mp4
    02:19
  • 061. Analysis of Competing Hypothesis.html
  • 061. Analysis of Competing Hypothesis - ACH.mp4
    33:20
  • 062. Mini Quiz.html
  • 063. Facts and Assumptions.html
  • 064. Understanding Information Reliability.html
  • 064. Understanding Information Reliability.mp4
    24:49
  • 065. Information Reliability Summarised.mp4
    04:25
  • 066. Expressing the Likelihood of Certainty.html
  • 066. Expressing the Likelihood of Certainty.mp4
    19:36
  • 067. Circular Reporting.html
  • 067. Circular Reporting.mp4
    14:01
  • 068. Cognitive Bias.html
  • 069. Bias in Detail.mp4
    12:07
  • 070. Data Analysis and Handling Errors .mp4
    12:03
  • 071. Analytical Techniques.html
  • 071. Analytical Techniques.mp4
    30:50
  • 072. Dissemination.html
  • 073. Structured Machine Readable.html
  • 073. Structured Machine Readable.mp4
    26:14
  • 074. Unstructured Human Readable.html
  • 074. Unstructured Human Readable.mp4
    22:03
  • 075. Intelligence Sharing.html
  • 075. Intelligence Sharing.mp4
    19:40
  • 076. Legal and Ethical.html
  • 077. Introduction to Legal and Ethical.html
  • 078. Applying Law and Ethics to CTI.mp4
    13:18
  • 079. Law and Ethics in Practice .mp4
    17:12
  • 080. Handling Classified Information.html
  • 080. Handling Classified Information .mp4
    38:23
  • 081. Key Legislation.html
  • 082. Key Legislation Introduction.mp4
    04:40
  • 083. Data Protection Act.html
  • 083. Data Protection Act.mp4
    06:10
  • 084. Computer Misuse Act.html
  • 084. Computer Misuse Act.mp4
    05:13
  • 085. Police and Justice Act.html
  • 085. Police and Justice Act.mp4
    05:30
  • 086. Bribery Act.html
  • 086. Bribery Act.mp4
    03:30
  • 087. Regulation of Investigative Powers Act.html
  • 087. Regulation of Investigative Powers Act .mp4
    04:31
  • 088. Proceeds of Crime Act.html
  • 088. Proceeds of Crime Act.mp4
    03:27
  • 089. Official Secrets Act.html
  • 089. Official Secrets Act.mp4
    02:31
  • 090. Telecommunications Act.html
  • 090. Telecommunications Act.mp4
    03:01
  • 091. Human Rights Act.html
  • 091. Human Rights Act.mp4
    04:59
  • 092. Mini Quiz.html
  • 093. Dealing with Legal and Ethical Uncertainty.html
  • 093. Dealing with Legal and Ethical Uncertainty.mp4
    18:53
  • 094. CREST Code of Conduct.html
  • 094. CREST Code of Conduct.mp4
    14:38
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 65
    • duration 15:20:06
    • Release Date 2025/01/22

    Courses related to Cyber Security