Programa del Curso
Introduction to Cyber Threat Intelligence (CTI)
- Definition and importance of CTI
- Types of Cyber Threat Intelligence: Tactical, Operational, Strategic, Technical
- Key concepts and terminologies
- Understanding different types of cyber threats (malware, phishing, ransomware, etc.)
- Historical perspective on cyber threats and attacks
- Current trends in the cyber threat landscape
- Stages of the intelligence lifecycle
Data Collection Methods
- Sources of intelligence data (open source, dark web, internal sources)
- Techniques for data collection
- Tools and technologies used in data collection
Data Processing and Enrichment
- Data processing techniques
- Data normalization and enrichment
- Automating data processing with tools
Intelligence Analysis Techniques
- Analytical methodologies: link analysis, trend analysis, behavioral analysis
- Tools for intelligence analysis
- Practical exercises on data analysis
Introduction to Threat Intelligence Platforms (TIPs)
- Overview of popular TIPs (e.g., MISP, ThreatConnect, Anomali)
- Key features and functionalities of TIPs
- Integration of TIPs with other security tools
Hands-On with Threat Intelligence Platforms
- Practical session on setting up and using a TIP
- Data ingestion and correlation
- Customizing alerts and reports
Automation in Threat Intelligence
- Importance of automation in CTI
- Tools and techniques for automating threat intelligence processes
- Practical exercises on automation scripts
Importance of Information Sharing
- Benefits and challenges of sharing threat intelligence
- Models and frameworks for information sharing (e.g., STIX/TAXII, OpenC2)
Building an Information Sharing Community
- Best practices for establishing a sharing community
- Legal and ethical considerations
- Case studies of successful information-sharing initiatives
Collaborative Threat Intelligence Exercises
- Conducting joint threat analysis
- Role-playing scenarios for intelligence sharing
- Developing strategies for effective collaboration
Advanced Threat Intelligence Techniques
- Use of machine learning and AI in CTI
- Advanced threat-hunting techniques
- Emerging trends in CTI
Case Studies of Cyber Attacks
- Detailed analysis of notable cyber attacks
- Lessons learned and intelligence insights
- Practical exercises on developing intelligence reports
Developing a CTI Program
- Steps to build and mature a CTI program
- Metrics and KPIs for measuring CTI effectiveness
Summary and Next Steps
Requerimientos
- Basic understanding of cybersecurity principles and practices
- Familiarity with network and information security concepts
- Experience with IT systems and infrastructure
Audience
- Cybersecurity professionals
- IT security analysts
- Security operations center (SOC) staff
Testimonios (3)
El capacitador estaba muy bien informado y se tomó el tiempo para brindar una muy buena visión de los problemas de seguridad cibernética. Muchos de estos ejemplos podrían usarse o modificarse para nuestros alumnos y crear algunas actividades de lección muy atractivas.
Jenna - Merthyr College
Curso - Fundamentals of Corporate Cyber Warfare
Traducción Automática
Habilidades de Pentester que demuestran el profesor
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Curso - Ethical Hacker
Traducción Automática
El instructor tiene una gama muy amplia de conocimientos y está comprometido con lo que hace. Es capaz de interesar al oyente con su curso. El alcance de la capacitación cumplió plenamente con mis expectativas.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Curso - MasterClass Certified Ethical Hacker Program
Traducción Automática