Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
IT Security
| Intermediate
- 20 Videos | 1h 38m 57s
- Includes Assessment
- Earns a Badge
Identifying and interpreting threat intelligence is crucial to preventing and mitigating cyber attacks. In this course, you'll explore the various threat intelligence types and how they relate to an organization's threat landscape. You'll begin by examining the key characteristics and benefits of threat intelligence and how to use it before, during, and after an attack. You'll then name known cyber threat actors and common indicators of compromise. You'll characterize intelligence, data, and information, and the four categories of threat intelligence: strategic, tactical, operational, and technical. You'll outline the threat intelligence lifecycle and how machine learning and risk modeling relate to threat intelligence. Lastly, you'll recognize threat intelligence use cases and sources, and how to map the threat landscape and benefit from intrusion detection and analysis.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this courserecognize the purpose and benefits of threat intelligence and outline its various definitionslist the core characteristics of threat intelligencename the parties who can benefit from threat intelligencedescribe when and how to use threat intelligence including before, during, and after an attackcategorize and identify the different cyber threat actorslist common indicators of compromisedifferentiate among intelligence, data, and informationoutline the 6 phases of the threat intelligence lifecycledescribe what is meant by strategic threat intelligence and list some common sources of information for it
-
define what is meant by tactical threat intelligence and recognize key components and benefits of itdefine what is meant by operational threat intelligence and outline some associated challenges and solutionsdefine what is meant by technical threat intelligence and describe its purposedescribe how machine learning can improve threat intelligencedefine what is involved in risk analysis and risk modeling as they relate to threat intelligence and outline the FAIR risk model and frameworklist the various use cases for threat intelligencedescribe how threat intelligence can help map the threat landscaperecognize why intrusion detection is the heart of threat intelligence and outline the kill chain and diamond models of analysisdifferentiate between different threat intelligent sources, such as credentials, mobile apps, social mediasummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview1m 49sUP NEXT
-
2.Threat Intelligence4m 26s
-
3.Key Elements of Threat Intelligence3m 24s
-
4.The Value of Threat Intelligence3m 44s
-
5.Using Threat Intelligence6m 2s
-
6.Cyber Threat Actors7m 17s
-
7.Common Indicators of Compromise6m 18s
-
8.Intelligence versus Data versus Information4m 17s
-
9.Threat Intelligence Lifecycle9m 20s
-
10.Strategic Threat Intelligence5m 37s
-
11.Tactical Threat Intelligence3m 43s
-
12.Operational Threat Intelligence3m 51s
-
13.Technical Threat Intelligence2m 35s
-
14.Machine Learning and Threat Intelligence4m 42s
-
15.Risk Modeling and Threat Intelligence9m 5s
-
16.Threat Intelligence Use Cases5m 15s
-
17.The Threat Landscape6m 7s
-
18.Intrusion Detection and Analysis3m 48s
-
19.Threat Intelligence Sources6m 27s
-
20.Course Summary1m 10s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.