What You Need to Know Before
You Start

Starts 10 June 2025 04:15

Ends 10 June 2025

00 days
00 hours
00 minutes
00 seconds
course image

Know the Enemy - How to Make Threat Intelligence Work

Explore effective threat intelligence strategies, from understanding attribution to leveraging the kill chain, with insights on APT 28 and key program functions for cybersecurity professionals.
via YouTube

2565 Courses


49 minutes

Optional upgrade avallable

Not Specified

Progress at your own speed

Conference Talk

Optional upgrade avallable

Overview

Explore effective threat intelligence strategies, from understanding attribution to leveraging the kill chain, with insights on APT 28 and key program functions for cybersecurity professionals.

Syllabus

  • Introduction to Threat Intelligence
  • Definition and Importance of Threat Intelligence
    Types of Threat Intelligence: Tactical, Operational, and Strategic
  • Understanding Attribution in Cybersecurity
  • Basics of Attribution
    Challenges and Techniques in Attribution
    Case Study: APT 28 (Fancy Bear) Attribution Example
  • The Cyber Kill Chain
  • Overview of the Cyber Kill Chain Model
    Stages of the Kill Chain: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command & Control, Actions on Objectives
    Applying the Kill Chain to Real-world Threats
  • Threat Intelligence Strategies
  • Building a Threat Intelligence Program
    Importance of Threat Feeds and Data Sources
    Analyzing and Prioritizing Threat Data
  • Leveraging Threat Intelligence for Defense
  • Integrating Intelligence into Defense Strategies
    Enhancing Incident Response with Threat Intelligence
    Proactive vs. Reactive Security Measures
  • Key Program Functions for Cybersecurity Professionals
  • Developing Threat Intelligence Skills and Competencies
    Collaborative Intelligence Sharing and Communication
    Tools and Technologies for Threat Intelligence
  • Case Studies and Practical Exercises
  • Detailed Analysis of APT 28 Activities
    Hands-on Exercises with Real-world Scenarios
  • Conclusion and Future Trends
  • Evolving Threat Landscapes
    Emerging Technologies in Threat Intelligence
    Career Opportunities in Threat Intelligence
  • Wrap-up and Q&A Session

Subjects

Conference Talks