Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
In this final video in Module 5 we discuss the Diamond Model. The model provides analysts with a simplified visualization of threats. We examine the four corners of the diamond, how the edges function, and the use of meta-data. The four edges of the Diamond Model are:
An example of this model in use is its application to malware. The discovery of an IP address can lead to a command and control server (C2) which may correlate to an adversary. Multiple victims may be an indication of a larger incident. The adversary may have the capability to conceal its presence using spoofing tactics. Threat actors engage in campaigns and can consist of several different types with varying goals. These actors can be cybercriminals, hacktivists, or state-sponsored hackers. Perhaps the most difficult adversary to detect is the privileged insider.
Module 1 - Introduction
Module 2 - Intelligence Foundations
Module 3 - CTI Perceptions
Module 4 - Tactical Threat Intelligence
Module 5 - Operational Threat Intelligence
Module 6 - Strategic Threat Intelligence
Module 7 - The Cyber Kill Chain
Module 8 - Tactical Threat Intelligence Requirements
Module 9 - Cyber Kill Chain Analysis
Module 10 - Cyber Kill Chain Management
Module 11 - Using Open Source Intelligence
Module 12 - Summary
Subscribe to become an Insider Pro and get access to premium content such as: