Price:
Days:
3
Fundamentals of threat intelligence (Threat intelligence types, lifecycle, strategy, capabilities, maturity model, frameworks, platforms, etc.) Various cybersecurity threats and attack frameworks (Advanced Persistent Threats, Cyber Kill Chain Methodology, MITRE ATT&CK Framework, Diamond Model of Intrusion Analysis, etc.) Various steps involved in planning a threat intelligence program (Requirements, planning, direction, and review) Different types of threat intelligence feeds, sources, data collection methods Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), malware analysis, and Python Scripting Threat intelligence data processing and exploitation Threat data analysis techniques (Statistical Data Analysis, Analysis of Competing Hypotheses (ACH), Structured Analysis of Competing Hypotheses (SACH), etc.) Complete threat analysis process, which includes threat modeling, fine-tuning, evaluation, and runbook and knowledge base creation Threat intelligence sharing and collaboration using Python Scripting Different platforms, acts, and regulations for sharing intelligence How to perform threat intelligence in a cloud environment Fundamentals of threat hunting (Threat hunting types, process, loop, methodology, etc.) Threat-hunting automation using Python Scripting Threat intelligence in SOC operations, incident response, and risk management
Mid-level to high-level cybersecurity professionals with a minimum of three years of experience. Individuals with EC-Council’s C|EH and C|ND certifications can enroll in this course.
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.