Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts

IT Security    |    Intermediate
  • 20 videos | 1h 38m 57s
  • Includes Assessment
  • Earns a Badge
Rating 4.6 of 232 users Rating 4.6 of 232 users (232)
Identifying and interpreting threat intelligence is crucial to preventing and mitigating cyber attacks. In this course, you'll explore the various threat intelligence types and how they relate to an organization's threat landscape. You'll begin by examining the key characteristics and benefits of threat intelligence and how to use it before, during, and after an attack. You'll then name known cyber threat actors and common indicators of compromise. You'll characterize intelligence, data, and information, and the four categories of threat intelligence: strategic, tactical, operational, and technical. You'll outline the threat intelligence lifecycle and how machine learning and risk modeling relate to threat intelligence. Lastly, you'll recognize threat intelligence use cases and sources, and how to map the threat landscape and benefit from intrusion detection and analysis.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Recognize the purpose and benefits of threat intelligence and outline its various definitions
    List the core characteristics of threat intelligence
    Name the parties who can benefit from threat intelligence
    Describe when and how to use threat intelligence including before, during, and after an attack
    Categorize and identify the different cyber threat actors
    List common indicators of compromise
    Differentiate among intelligence, data, and information
    Outline the 6 phases of the threat intelligence lifecycle
    Describe what is meant by strategic threat intelligence and list some common sources of information for it
  • Define what is meant by tactical threat intelligence and recognize key components and benefits of it
    Define what is meant by operational threat intelligence and outline some associated challenges and solutions
    Define what is meant by technical threat intelligence and describe its purpose
    Describe how machine learning can improve threat intelligence
    Define what is involved in risk analysis and risk modeling as they relate to threat intelligence and outline the fair risk model and framework
    List the various use cases for threat intelligence
    Describe how threat intelligence can help map the threat landscape
    Recognize why intrusion detection is the heart of threat intelligence and outline the kill chain and diamond models of analysis
    Differentiate between different threat intelligent sources, such as credentials, mobile apps, social media
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 49s
  • 4m 26s
    Upon completion of this video, you will be able to recognize the purpose and benefits of threat intelligence and outline its various definitions. FREE ACCESS
  • Locked
    3.  Key Elements of Threat Intelligence
    3m 24s
    Upon completion of this video, you will be able to list the core characteristics of threat intelligence. FREE ACCESS
  • Locked
    4.  The Value of Threat Intelligence
    3m 44s
    Upon completion of this video, you will be able to name the parties who can benefit from threat intelligence. FREE ACCESS
  • Locked
    5.  Using Threat Intelligence
    6m 2s
    After completing this video, you will be able to describe when and how to use threat intelligence, including before, during, and after an attack. FREE ACCESS
  • Locked
    6.  Cyber Threat Actors
    7m 17s
    In this video, you will learn how to categorize and identify different cyber threat actors. FREE ACCESS
  • Locked
    7.  Common Indicators of Compromise
    6m 18s
    After completing this video, you will be able to list common indicators of a security breach. FREE ACCESS
  • Locked
    8.  Intelligence versus Data versus Information
    4m 17s
    In this video, find out how to differentiate between intelligence, data, and information. FREE ACCESS
  • Locked
    9.  Threat Intelligence Lifecycle
    9m 20s
    Learn how to outline the six phases of the threat intelligence lifecycle. FREE ACCESS
  • Locked
    10.  Strategic Threat Intelligence
    5m 37s
    Upon completion of this video, you will be able to describe what is meant by strategic threat intelligence and list some common sources of information for it. FREE ACCESS
  • Locked
    11.  Tactical Threat Intelligence
    3m 43s
    In this video, you will learn how to define tactical threat intelligence and identify key components and benefits. FREE ACCESS
  • Locked
    12.  Operational Threat Intelligence
    3m 51s
    Find out how to define operational threat intelligence and outline some associated challenges and solutions. FREE ACCESS
  • Locked
    13.  Technical Threat Intelligence
    2m 35s
    During this video, you will learn how to define technical threat intelligence and its purpose. FREE ACCESS
  • Locked
    14.  Machine Learning and Threat Intelligence
    4m 42s
    After completing this video, you will be able to describe how machine learning can improve threat intelligence. FREE ACCESS
  • Locked
    15.  Risk Modeling and Threat Intelligence
    9m 5s
    During this video, you will learn how to define risk analysis and risk modeling as they relate to threat intelligence, and outline the FAIR risk model and framework. FREE ACCESS
  • Locked
    16.  Threat Intelligence Use Cases
    5m 15s
    After completing this video, you will be able to list the various uses for threat intelligence. FREE ACCESS
  • Locked
    17.  The Threat Landscape
    6m 7s
    After completing this video, you will be able to describe how threat intelligence can help you map the threat landscape. FREE ACCESS
  • Locked
    18.  Intrusion Detection and Analysis
    3m 48s
    Upon completion of this video, you will be able to recognize why intrusion detection is the heart of threat intelligence and outline the kill chain and diamond models of analysis. FREE ACCESS
  • Locked
    19.  Threat Intelligence Sources
    6m 27s
    In this video, you will learn how to differentiate between different threat intelligence sources, such as credentials, mobile apps, and social media. FREE ACCESS
  • Locked
    20.  Course Summary
    1m 10s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 188 users Rating 4.6 of 188 users (188)
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.4 of 91 users Rating 4.4 of 91 users (91)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 181 users Rating 4.6 of 181 users (181)
Rating 4.5 of 125 users Rating 4.5 of 125 users (125)
Rating 4.5 of 229 users Rating 4.5 of 229 users (229)