What You Need to Know Before
You Start
Starts 10 June 2025 04:15
Ends 10 June 2025
00
days
00
hours
00
minutes
00
seconds
49 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore effective threat intelligence strategies, from understanding attribution to leveraging the kill chain, with insights on APT 28 and key program functions for cybersecurity professionals.
Syllabus
- Introduction to Threat Intelligence
- Understanding Attribution in Cybersecurity
- The Cyber Kill Chain
- Threat Intelligence Strategies
- Leveraging Threat Intelligence for Defense
- Key Program Functions for Cybersecurity Professionals
- Case Studies and Practical Exercises
- Conclusion and Future Trends
- Wrap-up and Q&A Session
Definition and Importance of Threat Intelligence
Types of Threat Intelligence: Tactical, Operational, and Strategic
Basics of Attribution
Challenges and Techniques in Attribution
Case Study: APT 28 (Fancy Bear) Attribution Example
Overview of the Cyber Kill Chain Model
Stages of the Kill Chain: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, Actions on Objectives
Applying the Kill Chain to Real-world Threats
Building a Threat Intelligence Program
Importance of Threat Feeds and Data Sources
Analyzing and Prioritizing Threat Data
Integrating Intelligence into Defense Strategies
Enhancing Incident Response with Threat Intelligence
Proactive vs. Reactive Security Measures
Developing Threat Intelligence Skills and Competencies
Collaborative Intelligence Sharing and Communication
Tools and Technologies for Threat Intelligence
Detailed Analysis of APT 28 Activities
Hands-on Exercises with Real-world Scenarios
Evolving Threat Landscapes
Emerging Technologies in Threat Intelligence
Career Opportunities in Threat Intelligence
Subjects
Conference Talks