4 hours 42 minutes
Hello, this is Anne, said British. Welcome again to the Advance it Cyber Threat Intelligence Course. This is the first module data collection. First lesson. What is data collection?
In this video, we will dip dive into data collection. We will start with defining what is data collection, and then we will detain the different types off data collection sources.
Now let's start the definition off Collection collection is the process off gathering data and information to address intelligence requirements and objectives that were defined during the planning and direction face off the intelligence life cycle.
The data collected can be a finish. Its intelligence like intelligence reports from vendors or reports from cyber security blocks
road data from different sources off logs like firewall in points I ps et cetera, or damps, for example, based website.
I have a three recommendation about data collection. The 1st 1 is
in order to get a full picture about threats. Collecting data from one source is not sufficient. So basically, the more data you collect, the more evidence you will get in order to make assessment. But hold on
data needs to be relevant. Otherwise, these can slow down your investigations and coz knowledge, knowledge, gaps, so quality matters as much as quantity.
is also a time consuming task, so my recommendation here is automation. Automate as much as you can from the collection face so you can save a lot of time for Britain and analyzes.
Now let's move to the types off collection sources I can divide. Ah, the collection sources in tow, ju B categories, internal data sources and external ones.
Let's start with the internal sources. We can find different types off internal sources. We can find logs or more known as road data.
Also, vulnerability scan results we can. We can also find network capture tools or internal data basis. We can also find internal threats, reports from previous investigations or indicators off compromises or IOC's
ah, save it into SIM or, um threat, intelligence platform or even flat databases
and storied from previous investigations or previous cases
for the external sources, there are a lot of types. Ah, we can, um, we can say there are threatened thread data feuds or sent social media,
cyber security, blog's and threat reports shared by security experts or security vendors
Threat actor forums on the dark Web.
Let's summarize video. This is the first lesson in the first Model data collection. We started with data with the finding data collection face, then the different categories off collection sources. And then we gave We gave summer recommendation about data collection,
like collecting data from one source is not sufficient. Quality matters as much as quality and automation can save a lot of time for analysis. Face
This is it for this video and the next video, we'll dig more into the internal data sources. See you there.
MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training
Analysts and researchers gain hands-on instruction directly from MITRE’s experts in this MITRE ATT&CK Defender™ ...
3 CEU/CPE Hours Available
Certificate of Completion Offered
SOC Analyst I Workrole Assessment
The SOC Analyst I Workrole Assessment covers fundamentals SOC I skills such as incident response, ...