Time
3 hours 1 minute
Difficulty
Advanced
CEU/CPE
3

Video Transcription

00:04
What is Taxi
00:06
Texi is the trusted automated exchange of intelligence information,
00:11
and this is a Layer seven protocol
00:14
application layer protocol
00:16
that allows the severed threat intelligence to be exchanged using using https.
00:23
So especially for user's of sticks, which we covered in the last section,
00:30
Taxi allows the
00:32
basically the producer and the consumer to have a relationship
00:36
within the environment
00:39
in the case of a collection.
00:42
But we see here is that consumers can request information from a taxi server
00:48
taxi Silver hosts, the C T I,
00:52
and that relationship can trust relationship. To get this information back and forth can then be established.
00:59
Then there's also the channels idea,
01:02
or, in this case, the producers published or push the information to a server, which then goes to the consumers of the C. T. I. R. This this other information
01:12
So both models are viable depending on how your organization is set up, of course.
01:19
So let's have a look at
01:22
one of the island. Resource is for taxi
01:25
of shortness Urs, because it was too long to put in the slide.
01:34
But if you search for
01:37
taxi
01:38
W D. 01 working draft 01 you'll probably find this document.
01:42
I can see that there is the
01:46
the U R L There.
01:49
Anyway. So the document,
01:53
just like we saw with sticks. Uh, there's a nice Google Docks
01:57
document, and this gives all the relevant information about what Taxi does, how to use it, and so on,
02:07
going down to the overview
02:09
we can see again. It's CT. I exchange over https. It provides a P I A cz well,
02:15
so that you can integrate with other sharing models
02:23
a little bit about the roots of the A P. I sew for developers. You have your own scripts. You have your own other tools. You may be able to do this integration yourself, depending on whether or not you have the expertise. Or someone in your organization has the expertise.
02:38
And then there's a little bit more about collections and channels
02:40
we saw the diagram made it fairly self explanatory is as to how this is actually used
02:49
them. They're our core concepts to deal with all the different,
02:53
uh, aspects of using the technology like, how do you define an end point?
02:59
Some of the syntax is shown here
03:05
these air, different types of them points
03:07
to find with the appropriate syntax
03:12
a little bit about how sorting is done
03:15
filtering
03:17
on, especially for developers.
03:20
Details about the A P I.
03:25
How do you get connected to the server? How that to the consumers and producers work together.
03:31
So some good information here to look at
03:36
more about the channels,
03:42
and that should give you enough data to get least get started
03:46
in working with this technology.

Up Next

Advanced Cyber Threat Intelligence

The Cyber Threat Intelligence (CTI) course is taught by Cybrary SME, Dean Pompilio. It consists of 12 modules and provides a comprehensive introduction to CTI. The subject is an important one, and in addition to discussing tactics and methods, quite a bit of focus is placed on operational matters including the various CTI analyst roles.

Instructed By

Instructor Profile Image
Dean Pompilio
CEO of SteppingStone Solutions
Instructor