1.1 Course Introduction

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
4 hours 42 minutes
Difficulty
Advanced
CEU/CPE
5
Video Transcription
00:01
Hello and welcome to the advance of Cyber Threat Intelligence scores. My name is Alyssa British,
00:08
and this video is an introduction to the course.
00:11
Let me start by introducing myself.
00:14
My name is Alyssa Bearish.
00:17
I currently work as senior Cyber Threat analyst.
00:21
I am also a college in structure. For more than two years,
00:26
I teach cyber threat intelligence and malware analysis
00:31
I found in my online magazine on 2016
00:36
where I write technical articles about cyber security.
00:40
But not only this. I also write about events and conventions that I visit as well as other parts off my personal life, such as drips, animals,
00:53
especially gets
00:55
or even funny stuff.
00:57
If you are serious about my magazine, you can visit it at digitalis Dash mag dot net.
01:04
I hold few cybersecurity certifications such as GX, Cyber Threat Intelligence, Aiso I SMS implementer
01:14
and Aiso Cyber Security Manager.
01:17
If you have any question or feedback, please feel free to contact me on LinkedIn on Twitter.
01:23
If you wonder who should take this course,
01:26
basically, this course has an interesting material for
01:32
security practitioners.
01:34
Sock analysts
01:37
threat Intelligence analysts
01:38
threat hunters
01:41
incident dressed balls teams,
01:42
digital forensic and Muller analysts
01:47
briefly
01:48
any cyber security professionals who want to enrich their skills and knowledge in the field off cyber threatened traditions.
01:57
As you can understand from the title,
02:00
this course is an advanced that one and two fully take advantage. You need to be familiar with networking essentials
02:09
familiar with security terminologies such as firewall, same I PS et cetera.
02:16
You need also to complete the intro to Cyber Threat, Intelligence Course
02:22
and basic Awesome Knowledge. Basic understanding Off Cyber Kill Chain.
02:28
Basic understanding off data and the license are highly recommended
02:34
and off course. Don't forget to bring your willingness to learn something new
02:40
in this course. We will go step by step through the different types, off collection sources
02:46
and the Importance Off Data collection in Cyber Threat Intelligence Program.
02:52
We will see the steps off processing and management off the collected data.
02:59
We wouldn't see also examples off threat intelligence platforms or tips.
03:05
We will discover together methodologies. Use it for intrusion on the license, such as the cyber Kill chain and the Diamond model
03:15
and other ones that are used for campaign analysis, such as visual analyzes using tools like Multi go.
03:23
We will discuss as well one of the challenges facing threatened collisions analysts, which are their biases and logical fallacies, let my lead to errors in conclusions.
03:38
And lastly, we will see the importance off dissemination in Cyber Threat intelligence
03:45
and how is it done? Base it all the appropriate audience.
03:50
This course is structured as the following.
03:53
There are videos containing the presentation.
03:58
Assessment will be included in some videos and as separate quizzes
04:03
and as supplemental reading material. There is a dark file containing links to interesting books and articles that helped me to create this course
04:15
dealing so the file can be found attached to the description.
04:18
Now let's get an overview off the modules.
04:23
In these course, we will have six more jewels after the introduction and before the summary model,
04:30
the first module is about data collection.
04:33
In this module we went deep dive into the different types off data collection, starting from the internal data sources and going through the different categories off external data sources
04:46
and this model as well. We will get to discover how we can leverage awesome.
04:54
The second module will be dedicated to data management and processing.
04:59
We will start with the quick definition off what is processing and how is it useful? Then we will discover some of the common standards. Use it in cyber threat intelligence in order to normalize collected data and make it easier toe integrate within your IittIe infrastructure
05:18
or to store it
05:19
and share it. We will also see some examples off threatened delusions platforms.
05:28
In the third module, we will focus on intrusion analyzes
05:31
in this module we wouldn't define and the license face. And why is it important in cyber threat intelligence, we would discover multiple methods that can be used for analyzes such US
05:46
and the license of competing hypotheses
05:48
a combination off cyber kill chain and diamond model or a combination off cyber till chain and, of course, is off actions.
05:57
Our force module will be
06:00
fully dedicated to campaign analyzes.
06:02
We will start with definition off campaign,
06:06
and you will see some of the methods that can be used in campaign analyzes, like the hate map on the license or visual and the license. Using different tools like melty go,
06:19
we will go through the miter attack framework and we will see how we can leverage the miters red group tracker.
06:28
We will see as well what are the best options to name the campaign that you are analyzing.
06:33
The fifth module is about attribution.
06:36
We will start
06:39
with a quick definition off attribution. We will see some of the challenges that can be facing
06:46
analysts in the face off attribution
06:48
and some of these challenges are cognitive biases and logical errors. We will see how we can identify these
06:59
challenges
07:00
and how to manage them.
07:01
We will see what is the Nation state attribution as well.
07:06
The final module
07:08
will be dedicated to dissemination and feedback.
07:12
We will start as usual with the definition off dissemination sharing entry back.
07:18
Next we will discover the difference between the three pillars constituting cyber threat intelligence
07:27
which our tactical operational and strategic intelligence
07:31
based all their appropriate audience.
07:35
I hope this introduction gave you an overview off what we are going to learn in this course. In the next video, we will start with a quick introduction through the intelligence life cycle.
Up Next