1.1 Course Introduction
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
4 hours 42 minutes
Hello and welcome to the advance of Cyber Threat Intelligence scores. My name is Alyssa British,
and this video is an introduction to the course.
Let me start by introducing myself.
My name is Alyssa Bearish.
I currently work as senior Cyber Threat analyst.
I am also a college in structure. For more than two years,
I teach cyber threat intelligence and malware analysis
I found in my online magazine on 2016
where I write technical articles about cyber security.
But not only this. I also write about events and conventions that I visit as well as other parts off my personal life, such as drips, animals,
or even funny stuff.
If you are serious about my magazine, you can visit it at digitalis Dash mag dot net.
I hold few cybersecurity certifications such as GX, Cyber Threat Intelligence, Aiso I SMS implementer
and Aiso Cyber Security Manager.
If you have any question or feedback, please feel free to contact me on LinkedIn on Twitter.
If you wonder who should take this course,
basically, this course has an interesting material for
threat Intelligence analysts
incident dressed balls teams,
digital forensic and Muller analysts
any cyber security professionals who want to enrich their skills and knowledge in the field off cyber threatened traditions.
As you can understand from the title,
this course is an advanced that one and two fully take advantage. You need to be familiar with networking essentials
familiar with security terminologies such as firewall, same I PS et cetera.
You need also to complete the intro to Cyber Threat, Intelligence Course
and basic Awesome Knowledge. Basic understanding Off Cyber Kill Chain.
Basic understanding off data and the license are highly recommended
and off course. Don't forget to bring your willingness to learn something new
in this course. We will go step by step through the different types, off collection sources
and the Importance Off Data collection in Cyber Threat Intelligence Program.
We will see the steps off processing and management off the collected data.
We wouldn't see also examples off threat intelligence platforms or tips.
We will discover together methodologies. Use it for intrusion on the license, such as the cyber Kill chain and the Diamond model
and other ones that are used for campaign analysis, such as visual analyzes using tools like Multi go.
We will discuss as well one of the challenges facing threatened collisions analysts, which are their biases and logical fallacies, let my lead to errors in conclusions.
And lastly, we will see the importance off dissemination in Cyber Threat intelligence
and how is it done? Base it all the appropriate audience.
This course is structured as the following.
There are videos containing the presentation.
Assessment will be included in some videos and as separate quizzes
and as supplemental reading material. There is a dark file containing links to interesting books and articles that helped me to create this course
dealing so the file can be found attached to the description.
Now let's get an overview off the modules.
In these course, we will have six more jewels after the introduction and before the summary model,
the first module is about data collection.
In this module we went deep dive into the different types off data collection, starting from the internal data sources and going through the different categories off external data sources
and this model as well. We will get to discover how we can leverage awesome.
The second module will be dedicated to data management and processing.
We will start with the quick definition off what is processing and how is it useful? Then we will discover some of the common standards. Use it in cyber threat intelligence in order to normalize collected data and make it easier toe integrate within your IittIe infrastructure
or to store it
and share it. We will also see some examples off threatened delusions platforms.
In the third module, we will focus on intrusion analyzes
in this module we wouldn't define and the license face. And why is it important in cyber threat intelligence, we would discover multiple methods that can be used for analyzes such US
and the license of competing hypotheses
a combination off cyber kill chain and diamond model or a combination off cyber till chain and, of course, is off actions.
Our force module will be
fully dedicated to campaign analyzes.
We will start with definition off campaign,
and you will see some of the methods that can be used in campaign analyzes, like the hate map on the license or visual and the license. Using different tools like melty go,
we will go through the miter attack framework and we will see how we can leverage the miters red group tracker.
We will see as well what are the best options to name the campaign that you are analyzing.
The fifth module is about attribution.
We will start
with a quick definition off attribution. We will see some of the challenges that can be facing
analysts in the face off attribution
and some of these challenges are cognitive biases and logical errors. We will see how we can identify these
and how to manage them.
We will see what is the Nation state attribution as well.
The final module
will be dedicated to dissemination and feedback.
We will start as usual with the definition off dissemination sharing entry back.
Next we will discover the difference between the three pillars constituting cyber threat intelligence
which our tactical operational and strategic intelligence
based all their appropriate audience.
I hope this introduction gave you an overview off what we are going to learn in this course. In the next video, we will start with a quick introduction through the intelligence life cycle.