Threat Intelligence & Attribution Best Practices: Attribution Analysis
IT Security
| Intermediate
- 20 videos | 1h 22m 54s
- Includes Assessment
- Earns a Badge
Cyber attribution analysis is used to track, identify, and incriminate perpetrators of cyber attacks or exploits and is a must-know offensive security operations technique. In this course, you'll learn about the fundamental concepts and critical concerns related to attribution. You'll start by examining the different attribution types and levels before exploring attribution indicators, techniques, best practices, tools, and challenges. Moving on, you'll gain insight into how to identify and interpret forensic artifacts gathered from various sources, manage evidence, and make attribution judgments and assessments. You'll then study geopolitics, the Intelligence Community, and legal considerations as they relate to cyber threats and attribution. Lastly, you'll look into how malware cyber threat reverse engineering, code sharing analysis, and network behavior analysis lead to attribution.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseSummarize what is meant by attribution analysis and describe how it can relate to threat intelligenceDifferentiation between attribution types such as machine, human, and adversaryDescribe the different levels of attribution, including cyberweapon, country or city, and person or organizationList techniques and tools used by cybercrime investigators for performing cyber attributionList common challenges related to cyber attributionList key indicators that enable attributionOutline best practices for determining attributionOutline best practices for presenting attribution analysisDescribe how attribution judgments are made
-
Recognize the importance of identifying and preserving forensic artifacts and list common errors when dealing with digital evidenceOutline how to manage digital evidence properlyDescribe how attribution analysis can affect geopolitical dynamicsIdentify national-level partners in the intelligence community that can assist with attributionSummarize what is meant by malware cyber threats and interpret how reverse engineering malware can lead to attributionRecognize different code sharing analysis techniques that lead to attributionDescribe network behavior analysis techniques that lead to attributionRecognize legal implications related to cyber threats and attributionDefine indirect attribution and interrelate it to machine learning, social networks, and political ideologiesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 34s
-
3m 26sIn this video, you will summarize what is meant by attribution analysis and describe how it can relate to threat intelligence. FREE ACCESS
-
4m 46sIn this video, you will learn the difference between attribution types such as machine, human, and adversary. FREE ACCESS
-
4m 22sUpon completion of this video, you will be able to describe the different levels of attribution, including cyberweapon, country or city, and person or organization. FREE ACCESS
-
4m 3sAfter completing this video, you will be able to list techniques and tools used by cybercrime investigators for performing cyber attribution. FREE ACCESS
-
4m 13sAfter completing this video, you will be able to list common challenges related to cyber attribution. FREE ACCESS
-
4m 21sUpon completion of this video, you will be able to list key indicators that enable you to attribute something. FREE ACCESS
-
3m 13sIn this video, find out how to outline best practices for determining attribution. FREE ACCESS
-
3m 52sIn this video, find out how to outline best practices for presenting attribution analysis. FREE ACCESS
-
7m 43sUpon completion of this video, you will be able to describe how attribution judgments are made. FREE ACCESS
-
6mAfter completing this video, you will be able to recognize the importance of identifying and preserving forensic artifacts and list common errors when dealing with digital evidence. FREE ACCESS
-
3m 27sIn this video, you will learn how to manage digital evidence properly. FREE ACCESS
-
3m 29sUpon completion of this video, you will be able to describe how attribution analysis can affect geopolitical dynamics. FREE ACCESS
-
3m 13sIn this video, learn how to identify national-level partners in the Intelligence Community that can assist with attribution. FREE ACCESS
-
8m 21sIn this video, you will summarize what is meant by malware cyber threats and interpret how reverse engineering malware can lead to attribution. FREE ACCESS
-
4m 50sUpon completion of this video, you will be able to recognize different code sharing analysis techniques that can lead to attribution. FREE ACCESS
-
4m 13sAfter completing this video, you will be able to describe network behavior analysis techniques that lead to identifying the source of an attack. FREE ACCESS
-
2m 16sUpon completion of this video, you will be able to recognize legal implications related to cyber threats and attribution. FREE ACCESS
-
4m 16sIn this video, learn how to define indirect attribution and how it relates to machine learning, social networks, and political ideologies. FREE ACCESS
-
1m 18s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.