Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
Module 10 deals with the challenge of handling simultaneous intrusions. Multiple kill chains come into effect and the challenge is heightened to determine if any are related. Extra methodology is required in such a situation. Identification of separate, simultaneous intrusions begins with pattern recognition. Reliable methods are critical in this step to prevent the risk of confirmation bias and reaching false correlations. Assistance with correlation can come in the form of vendors alerts or correlation with other analysts and other teams via a comms plan. Coordination in the form of plans, policies, and procedures are required to govern info-sharing. Building a knowledge base of sanitized data is a challenging but worthwhile effort in order to assist with future simultaneous events.
Module 1 - Introduction
Module 2 - Intelligence Foundations
Module 3 - CTI Perceptions
Module 4 - Tactical Threat Intelligence
Module 5 - Operational Threat Intelligence
Module 6 - Strategic Threat Intelligence
Module 7 - The Cyber Kill Chain
Module 8 - Tactical Threat Intelligence Requirements
Module 9 - Cyber Kill Chain Analysis
Module 10 - Cyber Kill Chain Management
Module 11 - Using Open Source Intelligence
Module 12 - Summary
Subscribe to become an Insider Pro and get access to premium content such as: