Companies Home Search Profile

Cyber Threats and Kill Chain Methodology (C|TIA Prep)

Focused View

Ricardo Reimao

2:26:50

106 View
  • 1. Course Overview.mp4
    01:49
  • 1. The Threat Based Approach.mp4
    07:21
  • 2. Cyber Threats Overview.mp4
    03:08
  • 3. Analyzing Main Threat Vectors.mp4
    11:02
  • 4. Analyzing Threat Actors.mp4
    07:59
  • 5. Real-World Analysis_ Threat Actors.mp4
    04:21
  • 6. Understanding Your Enemies.mp4
    08:11
  • 1. Threats and IoCs.mp4
    08:44
  • 2. Understanding Main Indicators of Compromise.mp4
    10:27
  • 3. Indicators of Compromise in the Real World.mp4
    03:39
  • 4. Demo_ Investigating IoCs of a Ransomware Attack.mp4
    07:17
  • 1. Understanding the Kill Chain Methodology.mp4
    03:08
  • 2. The Kill Chain Process.mp4
    09:55
  • 3. Identifying Common Adversary Behavior.mp4
    07:58
  • 4. Fingerprinting an Adversary.mp4
    03:18
  • 5. Analyzing Real World Cyber Attacks.mp4
    09:34
  • 1. Understanding Highly Skilled Attackers.mp4
    02:07
  • 2. APT Objectives and Characteristics.mp4
    08:33
  • 3. The APT Lifecycle.mp4
    07:44
  • 4. Detecting and Preventing APTs.mp4
    02:39
  • 5. Demo_ The Mitre Att&ck Framework.mp4
    07:36
  • 6. Analyzing Real World APT Groups.mp4
    05:47
  • 7. Course Closure and C_TIA Certification Tips.mp4
    04:33
  • cyber-threats-kill-chain-ctia.zip
  • Description


    Understanding your enemy is essential for a threat intelligence analyst. This course will teach you about the main cyber threats and how attackers work.

    What You'll Learn?


      As a cyber threat intelligence analyst, you must understand the main threats and how attackers do their work. By understanding the hacker mindset and the procedures that malicious attackers use, you will be able to better protect your company. In this course, Cyber Threats and Kill Chain Methodology (C|TIA Prep), you’ll learn about the main cybersecurity threat vectors/actors as well as how the attackers perform their work. First, you’ll explore the main cyber security threats, including a deep dive into the most current threat vectors and threat actors. Next, you’ll discover the main indicators of compromise, so then you can easily spot early signs of intrusion in your organization. Finally, you’ll learn about Advanced Persistent Threats (APT) groups as well as the kill chain methodology that they use. When you’re finished with this course, you’ll have the skills and knowledge of the main threat vectors and threat actors needed to better protect your company. This course covers the second chapter of the Cyber Threat Intelligence Analyst (C|TIA or CTIA) Certification.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Ricardo Reimao
    Ricardo Reimao
    Instructor's Courses
    Ricardo is a Cybersecurity Consultant based in Toronto (Canada). He has 14+ years of IT experience, 10 of them in the IT Security field. His main interests are: SIEM solutions (IBM QRadar), Enterprise Security Risk, Penetration Testing, Security processes/procedures and Network Security.
    Pluralsight, LLC is an American privately held online education company that offers a variety of video training courses for software developers, IT administrators, and creative professionals through its website. Founded in 2004 by Aaron Skonnard, Keith Brown, Fritz Onion, and Bill Williams, the company has its headquarters in Farmington, Utah. As of July 2018, it uses more than 1,400 subject-matter experts as authors, and offers more than 7,000 courses in its catalog. Since first moving its courses online in 2007, the company has expanded, developing a full enterprise platform, and adding skills assessment modules.
    • language english
    • Training sessions 23
    • duration 2:26:50
    • level average
    • English subtitles has
    • Release Date 2023/02/28

    Courses related to Information Security