Wait a minute..

Cyber Threat Intelligence

This course is intended for anyone who wants to learn about cyber intelligence concepts and methods using open-source tools for operational security, infiltration, analysis, recommendation, and opportunity presentation, giving organizations first-hand understanding of their Internet attack surface.

Live Virtual Classroom
Intermediate 0(0 Ratings)
Created by Hacktrace Indonesia
What will I learn?
  • Learn the basic concept of Cyber Threat and Intelligence activities
  • Learn how to understand the threat and identify the attackers
  • Learn how to respond an incident and conduct the analysis needed
  • Learn how to consolidate and broaden understanding of filesystem forensics, advanced adversary investigations, incident response tactics, and advanced intrusion investigations
  • Learn how to master advanced intrusion investigation and incident response, as well as expand their investigative skills beyond traditional host-based digital forensics
  • Those looking to build an intelligence team or leverage intelligence within their organization are building their technical skills.
Live virtual classroom schedule
Schedule not yet available
Live online features
  • Instructor led, virtual streaming of your course with instructor Q&A
Offers
  • Hacktrace Certification Exam will be send after 7 days after course completion

Curriculum for this course
Study Case 1
14 Lessons
  • Anonymity Setting and Passive Persona
  • Gathering Method and Technique
  • Collection Plan
  • PIRs
  • Gathering Flow Process
  • Collection Tools and Targeting
  • Alignment with Hunt and Detect Needs
  • Ties to CSIRT
  • TTPs
  • IoCs
  • Threat Intelligence
  • Open Source Intelligence
  • All-Source Intelligence
  • Standard Glossary and Taxonomy
  • Organization
  • Production
  • Structured Analytic Techniques Adversary Denial and Deception
  • Use of Techniques
  • Types of Evidence
  • Production Management
  • Critical Thinking
  • Process Flow
  • Metrics
  • Intake forms
  • Templates
  • Organization
  • Types and Methods of Analysis
  • Decomposition
  • Recomposition
  • Methods for Fusion
  • Case Studies in Analysis
  • Cognitive Bias
  • Credibility and Reliability of Sources
  • Confidence Levels
  • Analysis of Competing Hypothesis
  • Flow into Hunt
  • IoCs
  • Inductive/Abductive/Deductive Reasoning
  • Historic trending and campaign analysis
  • Intelligence for organizational resilience
  • Identifying Your Consumers
  • Stakeholder Identification and Analysis
  • Standing Orders from Leadership
  • Analytic Writing
  • BLUF
  • AIMS
  • Types of Reports
  • Product Line Mapping / Report Serialization and Dissemination
  • Cyber and Threat Intelligence Program Strategic Plan
  • Goals & Objectives
Requirements
  • Laptop with minimum 8 gb of RAM
  • Minimum free 30 gb of Storage
  • Minimum i3 processor
+ View more
Description

This course is intended for anyone who wants to learn about cyber intelligence concepts and methods using open-source tools for operational security, infiltration, analysis, recommendation, and opportunity presentation, giving organizations first-hand understanding of their Internet attack surface. We strive to advance participants' capabilities in conducting cyber intelligence by outlining best practices and appropriate solutions to common challenges.

On this course, you will learn how to understand the threat and identify the attackers, how to respond an incident and conduct the analysis needed, learn how to consolidate and broaden understanding of filesystem forensics, advanced adversary investigations, incident response tactics, and advanced intrusion investigations, and also learn how to master advanced intrusion investigation and incident response, as well as expand their investigative skills beyond traditional host-based digital forensics.

+ View more
Other related courses

Student feedback
0
Average rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
Coming soon

Ask our team
INFO LEBIH LANJUT

Coming soon

Ask our team

Hi, you can chat with me

...