Schița de curs
Introduction to Cyber Threat Intelligence (CTI)
- Definition and importance of CTI
- Types of Cyber Threat Intelligence: Tactical, Operational, Strategic, Technical
- Key concepts and terminologies
- Understanding different types of cyber threats (malware, phishing, ransomware, etc.)
- Historical perspective on cyber threats and attacks
- Current trends in the cyber threat landscape
- Stages of the intelligence lifecycle
Data Collection Methods
- Sources of intelligence data (open source, dark web, internal sources)
- Techniques for data collection
- Tools and technologies used in data collection
Data Processing and Enrichment
- Data processing techniques
- Data normalization and enrichment
- Automating data processing with tools
Intelligence Analysis Techniques
- Analytical methodologies: link analysis, trend analysis, behavioral analysis
- Tools for intelligence analysis
- Practical exercises on data analysis
Introduction to Threat Intelligence Platforms (TIPs)
- Overview of popular TIPs (e.g., MISP, ThreatConnect, Anomali)
- Key features and functionalities of TIPs
- Integration of TIPs with other security tools
Hands-On with Threat Intelligence Platforms
- Practical session on setting up and using a TIP
- Data ingestion and correlation
- Customizing alerts and reports
Automation in Threat Intelligence
- Importance of automation in CTI
- Tools and techniques for automating threat intelligence processes
- Practical exercises on automation scripts
Importance of Information Sharing
- Benefits and challenges of sharing threat intelligence
- Models and frameworks for information sharing (e.g., STIX/TAXII, OpenC2)
Building an Information Sharing Community
- Best practices for establishing a sharing community
- Legal and ethical considerations
- Case studies of successful information-sharing initiatives
Collaborative Threat Intelligence Exercises
- Conducting joint threat analysis
- Role-playing scenarios for intelligence sharing
- Developing strategies for effective collaboration
Advanced Threat Intelligence Techniques
- Use of machine learning and AI in CTI
- Advanced threat-hunting techniques
- Emerging trends in CTI
Case Studies of Cyber Attacks
- Detailed analysis of notable cyber attacks
- Lessons learned and intelligence insights
- Practical exercises on developing intelligence reports
Developing a CTI Program
- Steps to build and mature a CTI program
- Metrics and KPIs for measuring CTI effectiveness
Summary and Next Steps
Cerințe
- Înțelegere de bază a principiilor și practicilor de securitate cibernetică
- Familiarizare cu conceptele de securitate a rețelelor și informațiilor
- Experiență cu sisteme și infrastructuri IT
Publicul țintă
- Profesioniști în domeniul securității cibernetice
- Analiști de securitate IT
- Personalul din centrele de operațiuni de securitate (SOC)
Mărturii (2)
Claritatea și ritmul explicațiilor
Federica Galeazzi - Aethra Telecomunications SRL
Curs - AI-Powered Cybersecurity: Advanced Threat Detection & Response
Tradus de catre o masina
Mă-a ajutat să înțept ce aveam nevoie :) Încep să predau pe o calificare BTEC Nivel 3 și voleam să-mi extind cunoștințele în această zonă.
Otilia Pasareti - Merthyr College
Curs - Fundamentals of Corporate Cyber Warfare
Tradus de catre o masina