Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Threat Intelligence - Basics & Fundamentals
Training Overview
Description of Training
Video Overview (1:29)
Introduction
Self-introduction (1:29)
Class Objectives (0:51)
Audience (1:01)
Outline (1:25)
Definitions & Fundamentals
Cyber Threat Intelligence - overview (0:23)
Definition - Cyberspace (1:39)
Definition - Threat (2:25)
Definition - Intelligence (3:45)
Definition - Cyber Threat Intelligence (0:42)
CTI Specific Terminology (1:21)
Definition - Threat Actor (3:05)
Definition - Persona (0:59)
Definition - Intelligence Requirements (1:36)
Definition - Campaign (1:54)
Definition - Tactiques, Techniques & Procedures (2:25)
Definition - Intrusion (1:40)
Definition - Traffic Light Protocol (3:08)
Definition - Indicator of Compromise (IoC) (2:14)
Quiz
Cyber Threat Intelligence Objectives
CTI Objectives - Overview (1:14)
Strategic Level Intelligence (1:07)
Operational Level Intelligence (0:56)
Tactical Level Intelligence (0:49)
CTI - Challenges (0:51)
Quiz
CTI Specific Models
CTI Specific Models - Overview (0:53)
Cyber Kill Chain - Overview (1:39)
Cyber Kill Chain - Reconnaissance phase (1:24)
Cyber Kill Chain - Weaponization phase (0:58)
Cyber Kill Chain - Delivery Phase (1:13)
Cyber Kill Chain - Exploit phase (0:59)
Cyber Kill Chain - Install phase (1:03)
Cyber Kill Chain - C2 phase (1:22)
Cyber Kill Chain - Actions on Objective phase (1:13)
Cyber Kill Chain - Example (3:30)
Diamond Model - Overview (1:31)
Diamond Model - Example (4:30)
Mitre ATT&CK Matrix - Overview (2:51)
Pyramid of Pain - Overview (4:43)
Quiz
CTI Reports - Examples
Mandiant APT 1 Report (2:52)
Lockbit 2.0 ransomware group - Primo-analysis (6:02)
SOC Tactical Report (4:18)
Use case 1 - Ransomware group Primo-Analysis
Scenario (1:30)
Planning & Direction Phase (5:12)
Collection phase - Define Sources of Interest (4:10)
Tips - Collection phase (6:34)
OSINT Integration framework - Overview (4:58)
OSINT Integration Framework - Example (4:49)
Collection phase - Information Crossing (2:49)
Final Report - Presentation (6:17)
Use Case 2 - Darkweb Monitoring
Scenario (1:01)
Scenario outline (0:46)
Tor network - Basics (3:54)
VPN - Basics (1:25)
VirtualBox & Remnux - Set Up (3:53)
Additional Tools - Set Up (4:01)
Darkweb - Forums & Marketplaces (6:48)
Darkweb - Ransomware Groups (3:44)
Use Case 3 - Adversary Controlled Infrastructure Hunting
Scenario (1:05)
C2 Hunting - Overview (1:34)
SSL Certificate Pivoting - Overview (1:34)
JARM Pivoting - Overview (1:59)
SSL Certificate & JARM Pivoting with Shodan (10:03)
Conclusion
Conclusion (1:17)
Audio Version of the Training
Audio Download
OSINT Integration framework - Overview
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock