Module 11 consists of three videos dealing with open source intelligence gathering. The latter videos introduce OS intel tools that provide invaluable assistance in the intel gathering process. In this first video, Dean reviews data pivoting using the Diamond Model. This method of pivoting involved using previously collected info. Dean discusses the 24 permutations of traversing the model. Pivoting objectives can vary such as pivoting for discovery or for inquiry. Dean concludes by discussing which indicators are best for pivoting based on vertice such as adversary, infrastructure, capability, or victim.
Intro to Cyber Threat Intelligence
The CTI course consists of 12 information-packed modules. CTI is a critical function within any organization that involves roles like analysts, methodologies, tools, teams, and policies. From threat analysis to the Cyber Kill Chain, learn it here.