课程大纲
Introduction to Cyber Threat Intelligence (CTI)
- Definition and importance of CTI
- Types of Cyber Threat Intelligence: Tactical, Operational, Strategic, Technical
- Key concepts and terminologies
- Understanding different types of cyber threats (malware, phishing, ransomware, etc.)
- Historical perspective on cyber threats and attacks
- Current trends in the cyber threat landscape
- Stages of the intelligence lifecycle
Data Collection Methods
- Sources of intelligence data (open source, dark web, internal sources)
- Techniques for data collection
- Tools and technologies used in data collection
Data Processing and Enrichment
- Data processing techniques
- Data normalization and enrichment
- Automating data processing with tools
Intelligence Analysis Techniques
- Analytical methodologies: link analysis, trend analysis, behavioral analysis
- Tools for intelligence analysis
- Practical exercises on data analysis
Introduction to Threat Intelligence Platforms (TIPs)
- Overview of popular TIPs (e.g., MISP, ThreatConnect, Anomali)
- Key features and functionalities of TIPs
- Integration of TIPs with other security tools
Hands-On with Threat Intelligence Platforms
- Practical session on setting up and using a TIP
- Data ingestion and correlation
- Customizing alerts and reports
Automation in Threat Intelligence
- Importance of automation in CTI
- Tools and techniques for automating threat intelligence processes
- Practical exercises on automation scripts
Importance of Information Sharing
- Benefits and challenges of sharing threat intelligence
- Models and frameworks for information sharing (e.g., STIX/TAXII, OpenC2)
Building an Information Sharing Community
- Best practices for establishing a sharing community
- Legal and ethical considerations
- Case studies of successful information-sharing initiatives
Collaborative Threat Intelligence Exercises
- Conducting joint threat analysis
- Role-playing scenarios for intelligence sharing
- Developing strategies for effective collaboration
Advanced Threat Intelligence Techniques
- Use of machine learning and AI in CTI
- Advanced threat-hunting techniques
- Emerging trends in CTI
Case Studies of Cyber Attacks
- Detailed analysis of notable cyber attacks
- Lessons learned and intelligence insights
- Practical exercises on developing intelligence reports
Developing a CTI Program
- Steps to build and mature a CTI program
- Metrics and KPIs for measuring CTI effectiveness
Summary and Next Steps
要求
- Basic understanding of cybersecurity principles and practices
- Familiarity with network and information security concepts
- Experience with IT systems and infrastructure
Audience
- Cybersecurity professionals
- IT security analysts
- Security operations center (SOC) staff
客户评论 (4)
培训师知识渊博,花时间对网路安全问题有很好的见解。这些例子中的很多都可以为我们的学习者使用或修改,并创建一些非常吸引人的课程活动。
Jenna - Merthyr College
课程 - Fundamentals of Corporate Cyber Warfare
机器翻译
渗透测试员的技能是什么证明老师
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
课程 - Ethical Hacker
机器翻译
讲师拥有非常广泛的知识,并致力于他的工作。他能够让听众对他的课程感兴趣。培训范围完全符合我的期望。
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
课程 - MasterClass Certified Ethical Hacker Program
机器翻译
All is excellent