Cursusaanbod

Introduction to Cyber Threat Intelligence (CTI)

  • Definition and importance of CTI
  • Types of Cyber Threat Intelligence: Tactical, Operational, Strategic, Technical
  • Key concepts and terminologies
  • Understanding different types of cyber threats (malware, phishing, ransomware, etc.)
  • Historical perspective on cyber threats and attacks
  • Current trends in the cyber threat landscape
  • Stages of the intelligence lifecycle

Data Collection Methods

  • Sources of intelligence data (open source, dark web, internal sources)
  • Techniques for data collection
  • Tools and technologies used in data collection

Data Processing and Enrichment

  • Data processing techniques
  • Data normalization and enrichment
  • Automating data processing with tools

Intelligence Analysis Techniques

  • Analytical methodologies: link analysis, trend analysis, behavioral analysis
  • Tools for intelligence analysis
  • Practical exercises on data analysis

Introduction to Threat Intelligence Platforms (TIPs)

  • Overview of popular TIPs (e.g., MISP, ThreatConnect, Anomali)
  • Key features and functionalities of TIPs
  • Integration of TIPs with other security tools

Hands-On with Threat Intelligence Platforms

  • Practical session on setting up and using a TIP
  • Data ingestion and correlation
  • Customizing alerts and reports

Automation in Threat Intelligence

  • Importance of automation in CTI
  • Tools and techniques for automating threat intelligence processes
  • Practical exercises on automation scripts

Importance of Information Sharing

  • Benefits and challenges of sharing threat intelligence
  • Models and frameworks for information sharing (e.g., STIX/TAXII, OpenC2)

Building an Information Sharing Community

  • Best practices for establishing a sharing community
  • Legal and ethical considerations
  • Case studies of successful information-sharing initiatives

Collaborative Threat Intelligence Exercises

  • Conducting joint threat analysis
  • Role-playing scenarios for intelligence sharing
  • Developing strategies for effective collaboration

Advanced Threat Intelligence Techniques

  • Use of machine learning and AI in CTI
  • Advanced threat-hunting techniques
  • Emerging trends in CTI

Case Studies of Cyber Attacks

  • Detailed analysis of notable cyber attacks
  • Lessons learned and intelligence insights
  • Practical exercises on developing intelligence reports

Developing a CTI Program

  • Steps to build and mature a CTI program
  • Metrics and KPIs for measuring CTI effectiveness

Summary and Next Steps

Vereisten

  • Basic understanding of cybersecurity principles and practices
  • Familiarity with network and information security concepts
  • Experience with IT systems and infrastructure

Audience

  • Cybersecurity professionals
  • IT security analysts
  • Security operations center (SOC) staff
 35 Uren

Leveringsopties

PRIVÉGROEPSTRAINING

Onze identiteit draait om het leveren van precies wat onze klanten nodig hebben.

  • Pre-cursusgesprek met uw trainer
  • Aanpassing van de leerervaring om uw doelen te bereiken -
    • Op maat gemaakte overzichten
    • Praktische, praktische oefeningen met gegevens / scenario's die herkenbaar zijn voor de cursisten
  • Training gepland op een datum naar keuze
  • Gegeven online, op locatie/klaslokaal of hybride door experts die ervaring uit de echte wereld delen

Private Group Prices RRP from €11400 online delivery, based on a group of 2 delegates, €3600 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.

Neem contact met ons op voor een exacte offerte en om onze laatste promoties te horen


OPENBARE TRAINING

Kijk op onze public courses

Reviews (3)

Voorlopige Aankomende Cursussen

Gerelateerde categorieën