4 hours 42 minutes
Hello and welcome to the third lesson from the module dissemination and feedback. In this lesson, we will focus all the operational intelligence.
This lesson is dedicated to fully understand operational and diligence, and it's different suspects. We will start with an understanding off what is operational intelligence. We will see the operational decisions and some of the benefits offer it by operational intelligence.
And we will finish with a quick overview
all the appropriate audience off. Operational Cyber intelligence
Operational intelligence is really time or near real time intelligence, often derived from technical means, and deliver it to ground troops engaged in activity against the adversary. Operational Cyber intelligence is data that can inform
Day Today decision making,
resource allocation and task prioritization. It includes
trends analysis showing the technical direction off threat actors
indications that an adversary has selected a particle er target and revelation off malicious tactics, techniques and procedures. It can also be useful in identifying threats against your network.
Examples off operational cyber intelligence include information feats from an information sharing and in the License Center or Zach
and alerts from the Department of Homeland Security, D. H s about a new threat threat
operational decisions made by security professionals. I t teams and even executed ve
are better informant with the knowledge off which tools adversaries are using, which vulnerabilities are they exploiting
and what techniques all our defenders are using to successful the mitigate the threat. This will enable decisionmakers toe better, prioritize daily work schedules,
build security teams and collaborate with outside the parliaments and business leaders. Other operational decisions include the policies you put into your I T systems
to automatically respond to tactical threats when he's comes to operational intelligence
and on the list can build a solid picture off actor methodology by bursting together tactical indicators and artefacts.
And there I've it into operational intelligence. This
can help toe in Ridge's security events and alerts for known bad atomic uses.
Equipment security Personal Now with the contacts that they need to make better security decisions. It can also help enhance incident response plans and mitigation techniques for future attacks and incidents.
It can help as well to implement on bolster a proactive discovery program or threat hunting program toe. Identify suspicious files on activity that has bypassed the traditional security technologies. It can help also
toe extract useful wreck teaming techniques
based on Attackers methods in the white. It can also help to perform actor based
or Mel. We're family based analytics for high risk threats through company industry, geography or nation. And finally,
they can also help to develop detection methodologies that are not dependent on Isis insuring broader coverage off threats in a more timely fashion.
Let's see the audience off operational cyber intelligence operations. Cyber Threat Intelligence is intended for an almost exclusively technical audience.
For example, we can find security operations, personnel and managers
so it unavoidably includes technical context.
In many ways, true operational Threat intelligence is the Holy Grail off security,
providing the fenders with an opportunity to put controls in place and block attacks before the A cure.
Operational threat Intelligence provides a greater level off context than tactical threat intelligence.
The main goal off operational cyber intelligence is to understand threat actors and their modus operandi.
It helps security teams investigate the capabilities, intent and methods, or Teepees
provides, imposed through network architect system administrators, et cetera,
And this is what we discover it during this video. Starting from the first part, the finding operational cyber intelligence, then seeing operational decisions and the benefits off operational intelligence. Tow the audience off this type of intelligence.
This is all for this video. I hope you enjoyed this lesson.
The next lesson will be about strategy, intelligence,
and it will be our last video off this module.
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training
This course prepares you for the ATT&CK® Cyber Threat Intelligence Certification, and provides hands-on instruction ...
3 CEU/CPE Hours Available
Certificate of Completion Offered