Course Summary
In this course, you will learn how to sharpen your analytical skills and apply structured analysis to enhance your security expertise. It focuses on building a strong analytical foundation to amplify both foundational and advanced skills. Participants will gain valuable knowledge and abilities, including:
Developing analytical skills to better understand, synthesize, and leverage complex scenarios.
Identifying and creating intelligence requirements using methods such as threat modeling.
Gaining expertise in tactical, operational, and strategic-level threat intelligence.
Generating actionable intelligence to detect, respond to, and counter focused and targeted threats.
Learning how to collect adversary data from various sources and exploit and pivot off those data.
Validating external intelligence to reduce the risks associated with inaccurate information.
Creating Indicators of Compromise (IOCs) in formats such as YARA and STIX/TAXII.
Understanding and leveraging adversary tactics, techniques, and procedures using frameworks like the Kill Chain, Diamond Model, and MITRE ATT&CK.
Applying structured analytical techniques to succeed in any security role.
Analysis of Intelligence
You will learn techniques for analyzing information and recognizing obstacles to accurate analysis, such as fallacies and biases, as well as strategies to avoid them.
Campaigns and Attribution
You will explore how to identify and profile intrusion characteristics and incorporate external intelligence into campaigns. Additionally, you will learn the importance of attribution and the factors involved in making accurate attributions.
Collecting and Storing Data Sets
You will gain an understanding of how to collect and store data from various sources, including threat feeds, domains, TLS certificates, and internal systems.
Intelligence Application
You will learn how to apply intelligence practically by gathering, analyzing, and utilizing it effectively. The course also covers how insights from past cyber attacks can inform intelligence strategies today.
Intelligence Fundamentals
You will develop a solid understanding of fundamental cyber threat intelligence concepts and definitions. Additionally, you will gain familiarity with technologies that support intelligence work, such as network indicators, log repositories, and forensic tools.
Kill Chain, Diamond Model, and Courses of Action Matrix
You will learn how to use frameworks like the Kill Chain, Diamond Model, and Courses of Action Matrix together to analyze intrusions comprehensively.
Malware as a Collection Source
You will explore tools and techniques for malware analysis to derive actionable intelligence.
Pivoting
You will develop skills in pivoting to expand intelligence collections, conduct pivot analysis, utilize link analysis tools, and perform domain analysis effectively.
Sharing Intelligence
You will understand the methods and best practices for storing and sharing intelligence from various sources. This includes learning how to use processes, tools, and techniques to share intelligence effectively and present tactical insights to executives through clear and accurate reporting and assessments.
Other Popular Courses
CompTIA: SecurityX
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CAS-005
Executive Cyber Risk Certification (ECRC)
- Duration: 2 Days
- Language: English
- Level: Advanced
- Exam: ECRC
Mastering Communication & Presentation Te...
- Duration: 5 Days
- Language: Danish
- Level: Intermediate
- Exam: MCPT