Schița de curs
Introduction to Cyber Threat Intelligence (CTI)
- Definition and importance of CTI
- Types of Cyber Threat Intelligence: Tactical, Operational, Strategic, Technical
- Key concepts and terminologies
- Understanding different types of cyber threats (malware, phishing, ransomware, etc.)
- Historical perspective on cyber threats and attacks
- Current trends in the cyber threat landscape
- Stages of the intelligence lifecycle
Data Collection Methods
- Sources of intelligence data (open source, dark web, internal sources)
- Techniques for data collection
- Tools and technologies used in data collection
Data Processing and Enrichment
- Data processing techniques
- Data normalization and enrichment
- Automating data processing with tools
Intelligence Analysis Techniques
- Analytical methodologies: link analysis, trend analysis, behavioral analysis
- Tools for intelligence analysis
- Practical exercises on data analysis
Introduction to Threat Intelligence Platforms (TIPs)
- Overview of popular TIPs (e.g., MISP, ThreatConnect, Anomali)
- Key features and functionalities of TIPs
- Integration of TIPs with other security tools
Hands-On with Threat Intelligence Platforms
- Practical session on setting up and using a TIP
- Data ingestion and correlation
- Customizing alerts and reports
Automation in Threat Intelligence
- Importance of automation in CTI
- Tools and techniques for automating threat intelligence processes
- Practical exercises on automation scripts
Importance of Information Sharing
- Benefits and challenges of sharing threat intelligence
- Models and frameworks for information sharing (e.g., STIX/TAXII, OpenC2)
Building an Information Sharing Community
- Best practices for establishing a sharing community
- Legal and ethical considerations
- Case studies of successful information-sharing initiatives
Collaborative Threat Intelligence Exercises
- Conducting joint threat analysis
- Role-playing scenarios for intelligence sharing
- Developing strategies for effective collaboration
Advanced Threat Intelligence Techniques
- Use of machine learning and AI in CTI
- Advanced threat-hunting techniques
- Emerging trends in CTI
Case Studies of Cyber Attacks
- Detailed analysis of notable cyber attacks
- Lessons learned and intelligence insights
- Practical exercises on developing intelligence reports
Developing a CTI Program
- Steps to build and mature a CTI program
- Metrics and KPIs for measuring CTI effectiveness
Summary and Next Steps
Cerințe
- Basic understanding of cybersecurity principles and practices
- Familiarity with network and information security concepts
- Experience with IT systems and infrastructure
Audience
- Cybersecurity professionals
- IT security analysts
- Security operations center (SOC) staff
Mărturii (3)
Formatorul a fost foarte bine informat și și-a făcut timp pentru a oferi o perspectivă foarte bună asupra problemelor de securitate cibernetică. Multe dintre aceste exemple ar putea fi utilizate sau modificate pentru cursanții noștri și ar putea crea unele activități de lecție foarte atractive.
Jenna - Merthyr College
Curs - Fundamentals of Corporate Cyber Warfare
Tradus de catre o masina
Pentester competențe ce demonstrează profesorul
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Curs - Ethical Hacker
Tradus de catre o masina
Instructorul are o gamă foarte largă de cunoștințe și se implică în ceea ce face. El este capabil să intereseze ascultătorul cu cursul său. Domeniul de aplicare al cursului a răspuns pe deplin așteptărilor mele.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Curs - MasterClass Certified Ethical Hacker Program
Tradus de catre o masina