Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts

IT Security    |    Intermediate
  • 20 Videos | 1h 47m 57s
  • Includes Assessment
  • Earns a Badge
Likes 2 Likes 2
Identifying and interpreting threat intelligence is crucial to preventing and mitigating cyber attacks. In this course, you'll explore the various threat intelligence types and how they relate to an organization's threat landscape. You'll begin by examining the key characteristics and benefits of threat intelligence and how to use it before, during, and after an attack. You'll then name known cyber threat actors and common indicators of compromise. You'll characterize intelligence, data, and information, and the four categories of threat intelligence: strategic, tactical, operational, and technical. You'll outline the threat intelligence lifecycle and how machine learning and risk modeling relate to threat intelligence. Lastly, you'll recognize threat intelligence use cases and sources, and how to map the threat landscape and benefit from intrusion detection and analysis.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    recognize the purpose and benefits of threat intelligence and outline its various definitions
    list the core characteristics of threat intelligence
    name the parties who can benefit from threat intelligence
    describe when and how to use threat intelligence including before, during, and after an attack
    categorize and identify the different cyber threat actors
    list common indicators of compromise
    differentiate among intelligence, data, and information
    outline the 6 phases of the threat intelligence lifecycle
    describe what is meant by strategic threat intelligence and list some common sources of information for it
  • define what is meant by tactical threat intelligence and recognize key components and benefits of it
    define what is meant by operational threat intelligence and outline some associated challenges and solutions
    define what is meant by technical threat intelligence and describe its purpose
    describe how machine learning can improve threat intelligence
    define what is involved in risk analysis and risk modeling as they relate to threat intelligence and outline the FAIR risk model and framework
    list the various use cases for threat intelligence
    describe how threat intelligence can help map the threat landscape
    recognize why intrusion detection is the heart of threat intelligence and outline the kill chain and diamond models of analysis
    differentiate between different threat intelligent sources, such as credentials, mobile apps, social media
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 49s
    UP NEXT
  • Playable
    2. 
    Threat Intelligence
    4m 26s
  • Locked
    3. 
    Key Elements of Threat Intelligence
    3m 24s
  • Locked
    4. 
    The Value of Threat Intelligence
    3m 44s
  • Locked
    5. 
    Using Threat Intelligence
    6m 2s
  • Locked
    6. 
    Cyber Threat Actors
    7m 17s
  • Locked
    7. 
    Common Indicators of Compromise
    6m 18s
  • Locked
    8. 
    Intelligence versus Data versus Information
    4m 17s
  • Locked
    9. 
    Threat Intelligence Lifecycle
    9m 20s
  • Locked
    10. 
    Strategic Threat Intelligence
    5m 37s
  • Locked
    11. 
    Tactical Threat Intelligence
    3m 43s
  • Locked
    12. 
    Operational Threat Intelligence
    3m 51s
  • Locked
    13. 
    Technical Threat Intelligence
    2m 35s
  • Locked
    14. 
    Machine Learning and Threat Intelligence
    4m 42s
  • Locked
    15. 
    Risk Modeling and Threat Intelligence
    9m 5s
  • Locked
    16. 
    Threat Intelligence Use Cases
    5m 15s
  • Locked
    17. 
    The Threat Landscape
    6m 7s
  • Locked
    18. 
    Intrusion Detection and Analysis
    3m 48s
  • Locked
    19. 
    Threat Intelligence Sources
    6m 27s
  • Locked
    20. 
    Course Summary
    1m 10s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE