Threat Intelligence & Attribution Best Practices: Attribution Analysis

IT Security    |    Intermediate
  • 20 videos | 1h 22m 54s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Cyber attribution analysis is used to track, identify, and incriminate perpetrators of cyber attacks or exploits and is a must-know offensive security operations technique. In this course, you'll learn about the fundamental concepts and critical concerns related to attribution. You'll start by examining the different attribution types and levels before exploring attribution indicators, techniques, best practices, tools, and challenges. Moving on, you'll gain insight into how to identify and interpret forensic artifacts gathered from various sources, manage evidence, and make attribution judgments and assessments. You'll then study geopolitics, the Intelligence Community, and legal considerations as they relate to cyber threats and attribution. Lastly, you'll look into how malware cyber threat reverse engineering, code sharing analysis, and network behavior analysis lead to attribution.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Summarize what is meant by attribution analysis and describe how it can relate to threat intelligence
    Differentiation between attribution types such as machine, human, and adversary
    Describe the different levels of attribution, including cyberweapon, country or city, and person or organization
    List techniques and tools used by cybercrime investigators for performing cyber attribution
    List common challenges related to cyber attribution
    List key indicators that enable attribution
    Outline best practices for determining attribution
    Outline best practices for presenting attribution analysis
    Describe how attribution judgments are made
  • Recognize the importance of identifying and preserving forensic artifacts and list common errors when dealing with digital evidence
    Outline how to manage digital evidence properly
    Describe how attribution analysis can affect geopolitical dynamics
    Identify national-level partners in the intelligence community that can assist with attribution
    Summarize what is meant by malware cyber threats and interpret how reverse engineering malware can lead to attribution
    Recognize different code sharing analysis techniques that lead to attribution
    Describe network behavior analysis techniques that lead to attribution
    Recognize legal implications related to cyber threats and attribution
    Define indirect attribution and interrelate it to machine learning, social networks, and political ideologies
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 34s
  • 3m 26s
    In this video, you will summarize what is meant by attribution analysis and describe how it can relate to threat intelligence. FREE ACCESS
  • Locked
    3.  Types of Attribution
    4m 46s
    In this video, you will learn the difference between attribution types such as machine, human, and adversary. FREE ACCESS
  • Locked
    4.  Levels of Attribution
    4m 22s
    Upon completion of this video, you will be able to describe the different levels of attribution, including cyberweapon, country or city, and person or organization. FREE ACCESS
  • Locked
    5.  Cyber Attribution Tools and Techniques
    4m 3s
    After completing this video, you will be able to list techniques and tools used by cybercrime investigators for performing cyber attribution. FREE ACCESS
  • Locked
    6.  Cyber Attribution Challenges
    4m 13s
    After completing this video, you will be able to list common challenges related to cyber attribution. FREE ACCESS
  • Locked
    7.  Attribution Indicators
    4m 21s
    Upon completion of this video, you will be able to list key indicators that enable you to attribute something. FREE ACCESS
  • Locked
    8.  Attribution Best Practices
    3m 13s
    In this video, find out how to outline best practices for determining attribution. FREE ACCESS
  • Locked
    9.  Attribution Assessments
    3m 52s
    In this video, find out how to outline best practices for presenting attribution analysis. FREE ACCESS
  • Locked
    10.  Attribution Judgments
    7m 43s
    Upon completion of this video, you will be able to describe how attribution judgments are made. FREE ACCESS
  • Locked
    11.  Cyber Forensic Artifacts
    6m
    After completing this video, you will be able to recognize the importance of identifying and preserving forensic artifacts and list common errors when dealing with digital evidence. FREE ACCESS
  • Locked
    12.  Managing Cyber Evidence
    3m 27s
    In this video, you will learn how to manage digital evidence properly. FREE ACCESS
  • Locked
    13.  Geopolitics and Attribution Analysis
    3m 29s
    Upon completion of this video, you will be able to describe how attribution analysis can affect geopolitical dynamics. FREE ACCESS
  • Locked
    14.  Attribution and the Intelligence Community
    3m 13s
    In this video, learn how to identify national-level partners in the Intelligence Community that can assist with attribution. FREE ACCESS
  • Locked
    15.  Malware Cyber Threats and Attribution
    8m 21s
    In this video, you will summarize what is meant by malware cyber threats and interpret how reverse engineering malware can lead to attribution. FREE ACCESS
  • Locked
    16.  Code Sharing Analysis and Attribution
    4m 50s
    Upon completion of this video, you will be able to recognize different code sharing analysis techniques that can lead to attribution. FREE ACCESS
  • Locked
    17.  Network Behavior Analysis and Attribution
    4m 13s
    After completing this video, you will be able to describe network behavior analysis techniques that lead to identifying the source of an attack. FREE ACCESS
  • Locked
    18.  Legal Considerations with Attribution
    2m 16s
    Upon completion of this video, you will be able to recognize legal implications related to cyber threats and attribution. FREE ACCESS
  • Locked
    19.  Indirect Attribution
    4m 16s
    In this video, learn how to define indirect attribution and how it relates to machine learning, social networks, and political ideologies. FREE ACCESS
  • Locked
    20.  Course Summary
    1m 18s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 5 users Rating 4.6 of 5 users (5)
Rating 4.6 of 188 users Rating 4.6 of 188 users (188)
Rating 4.6 of 232 users Rating 4.6 of 232 users (232)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 188 users Rating 4.6 of 188 users (188)
Rating 4.8 of 28 users Rating 4.8 of 28 users (28)
Rating 4.5 of 229 users Rating 4.5 of 229 users (229)