What You Need to Know Before
You Start
Starts 24 June 2025 17:53
Ends 24 June 2025
00
Days
00
Hours
00
Minutes
00
Seconds
27 minutes
Optional upgrade avallable
Not Specified
Progress at your own speed
Conference Talk
Optional upgrade avallable
Overview
Explore techniques for automating bulk intelligence collection in cybersecurity, including data mining, malware analysis, and email campaign investigation. Learn about the Yalda framework for efficient threat intelligence gathering.
Syllabus
- Introduction to Bulk Intelligence Collection
- Data Mining Techniques for Intelligence
- Automated Malware Analysis
- Email Campaign Investigation
- Yalda Framework for Threat Intelligence
- Integrating Automated Solutions in Cybersecurity Operations
- Ethics and Compliance in Intelligence Collection
- Practical Workshops and Case Studies
- Course Review and Future Directions
Overview of cybersecurity intelligence
Importance and challenges of automating intelligence collection
Fundamentals of data mining
Tools and technologies for data mining
Case studies in security data mining
Introduction to malware types and behaviors
Techniques for dynamic and static analysis
Automation tools for malware threat assessment
Identifying phishing and malicious campaigns
Automating email analysis and filtering
Case studies and practical tools for email threat intelligence
Overview of the Yalda framework
Implementing Yalda for threat detection
Enhancing threat intelligence with Yalda
Best practices for using automation in cybersecurity
Challenges and solutions in deploying automated intelligence systems
Legal considerations in intelligence automation
Ethical guidelines for data collection and usage
Hands-on sessions with data mining tools
Practical exercises in automated malware analysis
Real-world applications of the Yalda framework
Recap of key concepts and techniques
Emerging trends in automated intelligence collection
Resources for continued learning and development
Subjects
Conference Talks