Time
3 hours 1 minute
Difficulty
Advanced
CEU/CPE
3

Video Transcription

00:04
all right. So he finally made it to the end of the course. And I just wanted to do a quick recap on the different sections that we covered
00:11
in the hopes that it might spark you to, uh, take some of your research into a different direction
00:18
and hopefully find some new resource is that are truly useful.
00:24
We started off with the threatened trip, their intelligence maturity model,
00:29
much like the capability maturity models that you may already be familiar with. Then we moved on to
00:34
a little bit of insurance, interesting information about campaigns and some open source threat intelligence tools that are available
00:43
tools that can let you do analysis of domains links.
00:47
Looking at malware itself, we touched on visual ization of your information and the aggregation of intelligence and then wrapping up that module with what it means actually be
00:59
analyzing a campaign. And how is that determined
01:02
what kind of communications are required in order to get the right information in front of the right people
01:07
to continue and further that type of research than a model three. We touched on sharing
01:15
operational threat intelligence
01:18
and some of the challenges here, like where's your information actually kept. How do you distinguish between the requirements to do sharing a tactical basis versus an operational basis
01:29
and then working up to a strategic level of sharing, which is the longest time line?
01:34
And that the organization would be considering for this type of activity?
01:38
We also touched on several different tools
01:42
and some websites
01:45
that I have many cases. Free resource is available and then finally wrapped up with the analysis of the Strategic Threat Intelligence
01:53
first going into some of the ways that our minds may fail us by creating logical errors or
02:00
a cognitive bias. And then the remainder of the chapter was dealt was dealing with attribution,
02:07
some of the human aspects of doing this kind of work, some of the mistakes that we can make
02:10
the challenges of attribution in a
02:15
a nation state context and then finishing with
02:20
some of the
02:22
requirements for doing a strategic review
02:24
of your capabilities in order to create an active defense trying to better understand who who produces in Tallinn, who consumes it,
02:32
and overall focusing on making incremental improvements to the overall process. So hope you enjoy the course
02:39
and this is polymath signing up. Thank you

Advanced Cyber Threat Intelligence

The Cyber Threat Intelligence (CTI) course is taught by Cybrary SME, Dean Pompilio. It consists of 12 modules and provides a comprehensive introduction to CTI. The subject is an important one, and in addition to discussing tactics and methods, quite a bit of focus is placed on operational matters including the various CTI analyst roles.

Instructed By

Instructor Profile Image
Dean Pompilio
CEO of SteppingStone Solutions
Instructor