Threat Intelligence & Attribution Best Practices: Attribution Analysis
IT Security
| Intermediate
- 20 Videos | 1h 22m 54s
- Includes Assessment
- Earns a Badge
Cyber attribution analysis is used to track, identify, and incriminate perpetrators of cyber attacks or exploits and is a must-know offensive security operations technique. In this course, you'll learn about the fundamental concepts and critical concerns related to attribution. You'll start by examining the different attribution types and levels before exploring attribution indicators, techniques, best practices, tools, and challenges. Moving on, you'll gain insight into how to identify and interpret forensic artifacts gathered from various sources, manage evidence, and make attribution judgments and assessments. You'll then study geopolitics, the Intelligence Community, and legal considerations as they relate to cyber threats and attribution. Lastly, you'll look into how malware cyber threat reverse engineering, code sharing analysis, and network behavior analysis lead to attribution.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursesummarize what is meant by attribution analysis and describe how it can relate to threat intelligencedifferentiation between attribution types such as machine, human, and adversarydescribe the different levels of attribution, including cyberweapon, country or city, and person or organizationlist techniques and tools used by cybercrime investigators for performing cyber attributionlist common challenges related to cyber attributionlist key indicators that enable attributionoutline best practices for determining attributionoutline best practices for presenting attribution analysisdescribe how attribution judgments are made
-
recognize the importance of identifying and preserving forensic artifacts and list common errors when dealing with digital evidenceoutline how to manage digital evidence properlydescribe how attribution analysis can affect geopolitical dynamicsidentify national-level partners in the Intelligence Community that can assist with attributionsummarize what is meant by malware cyber threats and interpret how reverse engineering malware can lead to attributionrecognize different code sharing analysis techniques that lead to attributiondescribe network behavior analysis techniques that lead to attributionrecognize legal implications related to cyber threats and attributiondefine indirect attribution and interrelate it to machine learning, social networks, and political ideologiessummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 34sUP NEXT
-
2.Attribution Analysis and Threat Intelligence3m 26s
-
3.Types of Attribution4m 46s
-
4.Levels of Attribution4m 22s
-
5.Cyber Attribution Tools and Techniques4m 3s
-
6.Cyber Attribution Challenges4m 13s
-
7.Attribution Indicators4m 21s
-
8.Attribution Best Practices3m 13s
-
9.Attribution Assessments3m 52s
-
10.Attribution Judgments7m 43s
-
11.Cyber Forensic Artifacts6m
-
12.Managing Cyber Evidence3m 27s
-
13.Geopolitics and Attribution Analysis3m 29s
-
14.Attribution and the Intelligence Community3m 13s
-
15.Malware Cyber Threats and Attribution8m 21s
-
16.Code Sharing Analysis and Attribution4m 50s
-
17.Network Behavior Analysis and Attribution4m 13s
-
18.Legal Considerations with Attribution2m 16s
-
19.Indirect Attribution4m 16s
-
20.Course Summary1m 18s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.