Time
4 hours 8 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Description

Dean summarizes all of the topics covered in the course in this module. This was the introductory course on Cyber Threat Intelligence. Please stay tuned for the second half of the course coming later in 2017!

Video Transcription

00:04
all right. So we finished the introduction to Cyber Threat Intelligence.
00:07
So like to offer a quick summary.
00:09
So the topics that we covered,
00:12
we went over the foundations of intelligence gathering.
00:16
Some germ analogy. The lifecycle move down to the perceptions within an organization
00:21
stars what cyber threat Intelligence is, how it should be used,
00:25
the different kinds of
00:27
roles that organization might use.
00:30
In order to do this work correctly,
00:32
we also touched on it indicators of compromise.
00:36
Then way went into tactical threat intelligence, which is
00:40
sort of the the medium term
00:43
timeframe.
00:45
We talked about the Syracuse chain C K. C. Seven.
00:49
Also, we went into the
00:52
timeframes Operational Threat Intelligence,
00:55
which is more day to day in its actions and capabilities,
01:00
twisted on the operational threat intelligence role as well.
01:03
And we spent some time discussing the value of the diamond model.
01:07
Then we moved into strategic threat intelligence.
01:11
This is the longer timeframe.
01:14
Maybe a year or two years.
01:17
This involves threat modeling
01:19
and using proper change management configuration management.
01:23
We also look at the various tool
01:27
now you want a little bit deeper into the separate kill chain
01:30
reviewed the different steps all seven steps
01:34
and talked about the way that it might be used in organization to study the tactics, techniques and procedures of your adversaries.
01:42
We also touched on the requirements for tactical threat intelligence stars when an organization should do
01:49
at a high level to accommodate this type of capability.
01:55
Then we took a deep guy into C. K C seven
01:59
and looked at a lot of different
02:00
aspect of what kind of information is being gathered
02:05
and how it might be you
02:07
that best utilized by the organization. Depending on your perspective,
02:12
uh, this involves incident response in some cases
02:15
and trying to figure out what to do with Mao where that's been captured.
02:19
Can it be a reverse engineer to better understand it, for instance,
02:23
touched on the management of cyber kill chains, especially in those cases where you've got more than one in progress
02:30
and they need to be dealt with separately
02:34
or in parallel and trying to find ways to manage correlating information.
02:39
And then, lastly, we wrapped up with open source
02:43
with a demo of multi go
02:46
for open source intelligence gathering
02:49
and a nice overview of ah, great website that has over 250 different free resource is.
02:55
So I hope you enjoy the course
02:58
and stay tuned for the second half of this course. I'll be coming out later this year.
03:04
Thank you. And take care.

Intro to Cyber Threat Intelligence

The CTI course consists of 12 information-packed modules. CTI is a critical function within any organization that involves roles like analysts, methodologies, tools, teams, and policies. From threat analysis to the Cyber Kill Chain, learn it here.

Instructed By

Instructor Profile Image
Dean Pompilio
CEO of SteppingStone Solutions
Instructor