Threat Intelligence & Attribution Best Practices: Threat Intelligence Concepts
IT Security
| Intermediate
- 20 videos | 1h 38m 57s
- Includes Assessment
- Earns a Badge
Identifying and interpreting threat intelligence is crucial to preventing and mitigating cyber attacks. In this course, you'll explore the various threat intelligence types and how they relate to an organization's threat landscape. You'll begin by examining the key characteristics and benefits of threat intelligence and how to use it before, during, and after an attack. You'll then name known cyber threat actors and common indicators of compromise. You'll characterize intelligence, data, and information, and the four categories of threat intelligence: strategic, tactical, operational, and technical. You'll outline the threat intelligence lifecycle and how machine learning and risk modeling relate to threat intelligence. Lastly, you'll recognize threat intelligence use cases and sources, and how to map the threat landscape and benefit from intrusion detection and analysis.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseRecognize the purpose and benefits of threat intelligence and outline its various definitionsList the core characteristics of threat intelligenceName the parties who can benefit from threat intelligenceDescribe when and how to use threat intelligence including before, during, and after an attackCategorize and identify the different cyber threat actorsList common indicators of compromiseDifferentiate among intelligence, data, and informationOutline the 6 phases of the threat intelligence lifecycleDescribe what is meant by strategic threat intelligence and list some common sources of information for it
-
Define what is meant by tactical threat intelligence and recognize key components and benefits of itDefine what is meant by operational threat intelligence and outline some associated challenges and solutionsDefine what is meant by technical threat intelligence and describe its purposeDescribe how machine learning can improve threat intelligenceDefine what is involved in risk analysis and risk modeling as they relate to threat intelligence and outline the fair risk model and frameworkList the various use cases for threat intelligenceDescribe how threat intelligence can help map the threat landscapeRecognize why intrusion detection is the heart of threat intelligence and outline the kill chain and diamond models of analysisDifferentiate between different threat intelligent sources, such as credentials, mobile apps, social mediaSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 49s
-
4m 26sUpon completion of this video, you will be able to recognize the purpose and benefits of threat intelligence and outline its various definitions. FREE ACCESS
-
3m 24sUpon completion of this video, you will be able to list the core characteristics of threat intelligence. FREE ACCESS
-
3m 44sUpon completion of this video, you will be able to name the parties who can benefit from threat intelligence. FREE ACCESS
-
6m 2sAfter completing this video, you will be able to describe when and how to use threat intelligence, including before, during, and after an attack. FREE ACCESS
-
7m 17sIn this video, you will learn how to categorize and identify different cyber threat actors. FREE ACCESS
-
6m 18sAfter completing this video, you will be able to list common indicators of a security breach. FREE ACCESS
-
4m 17sIn this video, find out how to differentiate between intelligence, data, and information. FREE ACCESS
-
9m 20sLearn how to outline the six phases of the threat intelligence lifecycle. FREE ACCESS
-
5m 37sUpon completion of this video, you will be able to describe what is meant by strategic threat intelligence and list some common sources of information for it. FREE ACCESS
-
3m 43sIn this video, you will learn how to define tactical threat intelligence and identify key components and benefits. FREE ACCESS
-
3m 51sFind out how to define operational threat intelligence and outline some associated challenges and solutions. FREE ACCESS
-
2m 35sDuring this video, you will learn how to define technical threat intelligence and its purpose. FREE ACCESS
-
4m 42sAfter completing this video, you will be able to describe how machine learning can improve threat intelligence. FREE ACCESS
-
9m 5sDuring this video, you will learn how to define risk analysis and risk modeling as they relate to threat intelligence, and outline the FAIR risk model and framework. FREE ACCESS
-
5m 15sAfter completing this video, you will be able to list the various uses for threat intelligence. FREE ACCESS
-
6m 7sAfter completing this video, you will be able to describe how threat intelligence can help you map the threat landscape. FREE ACCESS
-
3m 48sUpon completion of this video, you will be able to recognize why intrusion detection is the heart of threat intelligence and outline the kill chain and diamond models of analysis. FREE ACCESS
-
6m 27sIn this video, you will learn how to differentiate between different threat intelligence sources, such as credentials, mobile apps, and social media. FREE ACCESS
-
1m 10s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.