4 hours 42 minutes
Hello and welcome to the second. Ah, lesson off the first module data collection. This video is about internal data acquisition.
This video is fully dedicated toe. Explain the different categories off internal data sources before thinking off gathering data or information from external sources. It is wise to think about getting the most off out off your available row crystals. Or should I say
I t environment or IittIe infrastructure?
There are literally hundreds off possible types off data sources around your environment. By leveraging threat data from your own network, you can detect and stop threats. In these cases, you need to know that understanding all the lock types and sources available for selection
can be pretty difficult.
And there is no way we could everything to cover every possible source of flocks. This is why we need to identify what may be more valuable than others as a star's point, and you can always add more sources as we go.
So let's start with defining what data are re collecting and certainly
internal data sources in globe Any data that could be collected within the organization
it's can be host or endpoint data
network data or even finish it. Intelligence. Keep in mind that in most of the cases, threat intelligence analysts are not responsible for data collection. But they need to be knowledgeable about the kind off data they would request from other teams
in order to build context,
especially in case off incident.
So let's start with ah hose data
whose data comes from endpoint devices so we can call it also end point data.
These devices can be mobile phones, laptops, desktops, species, but also makeover hardware such as servers like in the data centers.
You'll be interested in collecting the following data with their within your end points
process. Execution meta data.
This data will contain information all the different processes run in on your end parts
registry. Excess data.
This data will be related to registry objects, including keys and value meta data on Windows Base. It's in sports, of course
file data. This data includes dates when the files all the hosts were created or modified, as well as their size type and location where they are storied within the disc.
Finally, network data.
This data will define the parent process for network connections.
So, um, here data could be collected through DDR
ideas some sensors but also through forensic tools.
Now let's move to the second type off internal later sources network data.
It involves collecting data from network and security devices available in your environment. Here I collected some sources that you might find in your IittIe infrastructure, starting with off with the firewall. This data is one of the most important data that it will be collected
so they viral logs will contain information on network traffic
as the border off the network
proxy logs. Here you will be, ah collecting http data containing information on outgoing Web requests such as Internet resources that are being accessed within the internal network.
the logs you will get here with contain data related do domain name server resolution.
These will include domain toe I p address mapping
Web server logs. They record all user requests that were process it by the server, including information about the users.
These logs also include our errors.
We can find also authentication server logs if they include signing failures. Ah, successful Loggins and valid request, etcetera.
You can ingest all of these logs into a same solution and create specific rules for detection.
And speaking of this, if you are interested in learning more about since I highly recommend visiting the different courses and laps about Central's and products that are already available on cyber
second emissions data is the serotype off internal data sources.
Threat Intelligence data comes from working on investigations.
You can leverage intelligence from your own network, especially when you are working on a campaign and a license.
In many cases, your own network shows more relevant intelligence tour organization than the intelligence that you are collecting from external data sources
and maintaining historical knowledge off. Best investigation
is helpful in leveraging more mature threat awareness based on internal sources, including indicators off compromise, story in your threat, intelligence platform,
vulnerability scan reports, malware analysis reports,
incident response reports and threat intelligence reports, including the related indicators. Muller And if no, the attribution and Motivation off Adversary.
That's all for this lesson.
Ah, here We discussed it the different types off until internal data sources started with host data sources,
network data source and threat Intelligence data source.
In the next video, we will move to the second type off data collection. The external later sources see you there
MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training
Analysts and researchers gain hands-on instruction directly from MITRE’s experts in this MITRE ATT&CK Defender™ ...
3 CEU/CPE Hours Available
Certificate of Completion Offered
SOC Analyst I Workrole Assessment
The SOC Analyst I Workrole Assessment covers fundamentals SOC I skills such as incident response, ...