Course Summary

In this course, you will learn how to sharpen your analytical skills and apply structured analysis to enhance your security expertise. It focuses on building a strong analytical foundation to amplify both foundational and advanced skills. Participants will gain valuable knowledge and abilities, including:

Developing analytical skills to better understand, synthesize, and leverage complex scenarios.
Identifying and creating intelligence requirements using methods such as threat modeling.
Gaining expertise in tactical, operational, and strategic-level threat intelligence.
Generating actionable intelligence to detect, respond to, and counter focused and targeted threats.
Learning how to collect adversary data from various sources and exploit and pivot off those data.
Validating external intelligence to reduce the risks associated with inaccurate information.
Creating Indicators of Compromise (IOCs) in formats such as YARA and STIX/TAXII.
Understanding and leveraging adversary tactics, techniques, and procedures using frameworks like the Kill Chain, Diamond Model, and MITRE ATT&CK.
Applying structured analytical techniques to succeed in any security role.

Analysis of Intelligence
You will learn techniques for analyzing information and recognizing obstacles to accurate analysis, such as fallacies and biases, as well as strategies to avoid them.

Campaigns and Attribution
You will explore how to identify and profile intrusion characteristics and incorporate external intelligence into campaigns. Additionally, you will learn the importance of attribution and the factors involved in making accurate attributions.

Collecting and Storing Data Sets
You will gain an understanding of how to collect and store data from various sources, including threat feeds, domains, TLS certificates, and internal systems.

Intelligence Application
You will learn how to apply intelligence practically by gathering, analyzing, and utilizing it effectively. The course also covers how insights from past cyber attacks can inform intelligence strategies today.

Intelligence Fundamentals
You will develop a solid understanding of fundamental cyber threat intelligence concepts and definitions. Additionally, you will gain familiarity with technologies that support intelligence work, such as network indicators, log repositories, and forensic tools.

Kill Chain, Diamond Model, and Courses of Action Matrix
You will learn how to use frameworks like the Kill Chain, Diamond Model, and Courses of Action Matrix together to analyze intrusions comprehensively.

Malware as a Collection Source
You will explore tools and techniques for malware analysis to derive actionable intelligence.

Pivoting
You will develop skills in pivoting to expand intelligence collections, conduct pivot analysis, utilize link analysis tools, and perform domain analysis effectively.

Sharing Intelligence
You will understand the methods and best practices for storing and sharing intelligence from various sources. This includes learning how to use processes, tools, and techniques to share intelligence effectively and present tactical insights to executives through clear and accurate reporting and assessments.

This course has no formal prerequisites.

proctored exam 75-82 questions 2-3 hours Minimum passing score of 71%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?