Threat Intelligence & Attribution Best Practices: Attribution Analysis

IT Security    |    Intermediate
  • 20 Videos | 1h 31m 54s
  • Includes Assessment
  • Earns a Badge
Cyber attribution analysis is used to track, identify, and incriminate perpetrators of cyber attacks or exploits and is a must-know offensive security operations technique. In this course, you'll learn about the fundamental concepts and critical concerns related to attribution. You'll start by examining the different attribution types and levels before exploring attribution indicators, techniques, best practices, tools, and challenges. Moving on, you'll gain insight into how to identify and interpret forensic artifacts gathered from various sources, manage evidence, and make attribution judgments and assessments. You'll then study geopolitics, the Intelligence Community, and legal considerations as they relate to cyber threats and attribution. Lastly, you'll look into how malware cyber threat reverse engineering, code sharing analysis, and network behavior analysis lead to attribution.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    summarize what is meant by attribution analysis and describe how it can relate to threat intelligence
    differentiation between attribution types such as machine, human, and adversary
    describe the different levels of attribution, including cyberweapon, country or city, and person or organization
    list techniques and tools used by cybercrime investigators for performing cyber attribution
    list common challenges related to cyber attribution
    list key indicators that enable attribution
    outline best practices for determining attribution
    outline best practices for presenting attribution analysis
    describe how attribution judgments are made
  • recognize the importance of identifying and preserving forensic artifacts and list common errors when dealing with digital evidence
    outline how to manage digital evidence properly
    describe how attribution analysis can affect geopolitical dynamics
    identify national-level partners in the Intelligence Community that can assist with attribution
    summarize what is meant by malware cyber threats and interpret how reverse engineering malware can lead to attribution
    recognize different code sharing analysis techniques that lead to attribution
    describe network behavior analysis techniques that lead to attribution
    recognize legal implications related to cyber threats and attribution
    define indirect attribution and interrelate it to machine learning, social networks, and political ideologies
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 34s
    UP NEXT
  • Playable
    2. 
    Attribution Analysis and Threat Intelligence
    3m 26s
  • Locked
    3. 
    Types of Attribution
    4m 46s
  • Locked
    4. 
    Levels of Attribution
    4m 22s
  • Locked
    5. 
    Cyber Attribution Tools and Techniques
    4m 3s
  • Locked
    6. 
    Cyber Attribution Challenges
    4m 13s
  • Locked
    7. 
    Attribution Indicators
    4m 21s
  • Locked
    8. 
    Attribution Best Practices
    3m 13s
  • Locked
    9. 
    Attribution Assessments
    3m 52s
  • Locked
    10. 
    Attribution Judgments
    7m 43s
  • Locked
    11. 
    Cyber Forensic Artifacts
    6m
  • Locked
    12. 
    Managing Cyber Evidence
    3m 27s
  • Locked
    13. 
    Geopolitics and Attribution Analysis
    3m 29s
  • Locked
    14. 
    Attribution and the Intelligence Community
    3m 13s
  • Locked
    15. 
    Malware Cyber Threats and Attribution
    8m 21s
  • Locked
    16. 
    Code Sharing Analysis and Attribution
    4m 50s
  • Locked
    17. 
    Network Behavior Analysis and Attribution
    4m 13s
  • Locked
    18. 
    Legal Considerations with Attribution
    2m 16s
  • Locked
    19. 
    Indirect Attribution
    4m 16s
  • Locked
    20. 
    Course Summary
    1m 18s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE