Price: 599 INR (8.00 USD) | Size: 2.25 GB | 1 DVD | Duration : 4.21 Hours | BRAND: Expert TRAINING | ENGLISH | DOWNLOAD
- Key issues in the InfoSec domain.
- Importance of threat intelligence in risk management, SIEM, and incident response.
- Various cyber threats, threat actors, and their objectives for cyberattacks.
- Fundamentals of threat intelligence (including threat intelligence types, life cycle, strategy, capabilities, maturity model, frameworks, etc.)
- Cyber kill chain methodology, Advanced Persistent Threat (APT), Indicators of Compromise (IoCs), and the pyramid of pain.
- Threat intelligence program steps (Requirements, Planning, Direction, Review).
- Types of data feeds, sources, and data collection methods.
- Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), and malware analysis.
- Bulk data collection and management (data processing, structuring, normalization, sampling, storing, and visualization).
- Data analysis types and techniques including Statistical Data Analysis, Structured Analysis of Competing Hypotheses (SACH), etc.
- Complete threat analysis process including threat modeling, fine-tuning, evaluation, runbook, and knowledge base creation.
- Different data analysis, threat modeling, and threat intelligence tools.
- Creating effective threat intelligence reports.
- Different threat intelligence sharing platforms, acts, and regulations for sharing strategic, tactical, operational, and technical intelligence.
Organizations today demand a professional-level cybersecurity threat intelligence analyst who can extract intelligence from data by implementing various advanced strategies. Such professional-level threat intelligence training programs can only be achieved when the core of the curricula maps with and is compliant to government and industry published threat intelligence frameworks.
CTIA is a method-driven threat intelligence program that uses a 360-degree approach, covering concepts from planning to building a threat intelligence report for pre-emptive threat detection and preventive measures. These concepts are highly essential while building effective threat intelligence and, when used properly, can secure organizations from future threats or attacks.
Video Lessons in this course
1 - Phases Overview
01 Phases Overview
02 Hunting and Features Extraction
03 Behavior Extraction
04 Clustering and Correlation & Threat Actor Attribution
05 Tracking and Taking Down
2 - Hunting
06 VirusTotal
07 Lab-VirusTotal Intelligence
08 Hacking Forums
09 DeepWeb
10 Honeypot and OSINT
3 - Features Extraction
11 Intro
12 Import Table Hash (imphash)
13 Strings
14 Lab 1-Extracting VBA Macros with Didier Stevens Tools
15 Lab 2-C2 IP Pivoting
4 - Behavior Extraction
16 Dynamic Indicators
17 Process Infector, Keylogger & Passive DNS
5 - Clustering and Correlation
18 How Clustering & Correlation Work
19 GraphDB
6 - Tracking
Size Last Modified
20 Passive DNS & Internet Port Scan
21 Lookups, OSINT & Hacking Forums
7 - Taking Down
22 Sinkhole
23 Hacking Forums & Victim Notification
8 - Attribution
24 Who Are The Targets and Where Are They Located_
25 Tactics, Techniques & Procedures-Part 01
26 Tactics, Techniques & Procedures-Part 02
27 Profiling the Attacker
Cyber Security Threat Intelligence Research (CTIR) Video Course
If you Select DVD It will delivery only in INDIA.
Download Links Will Send to foreign Buyers If you select Download via email links.
Download Links will send to your email address within 12 hours of purchase.
You just click and download Instantly your course Anywhere from that Download links.