Sale!

Building Cyber Threat Intelligence Capabilities

Original price was: $15.00.Current price is: $7.00.

Price: 7.00 USD | Size: 7.80 GB | Duration : 7.20+  Hours

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

Description

Price: 7.00 USD | Size: 7.80 GB | Duration : 7.20+  Hours

BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD

 

Building Cyber Threat Intelligence Capabilities

Content

01 – Course Introduction

02 – Introduction to Cyber Threat Intelligence

03 – What makes a successful Cyber Threat Intelligence Program

04 – What you should know when developing a successful CTI program Part 1

05 – What you should know when developing a successful CTI program Part 2

06 – What you should know when developing a successful CTI program Part 3

07 – What resources do I need

08 – Summary

09 – What is next

10 – Discovery Introduction

11 – Discovery Activities

12 – Data collection Part 1

13 – Data Collection Part 2

14 – Data collection sample

15 – Action Items

16 – Summary

17 – What is next

18 – Introduction Risk assessment and threat modelling

19 – Risk assessment and threat modelling

20 – Risk and threat models by category Part 1

21 – Risk and threat models by category Part 2

22 – Threat Metrics

23 – Threat modelling example

24 – Action Items

25 – Summary

26 – What is Next

27 – Introduction

28 – Intelligence Requirements

29 – Anatomy of a Intelligence Requirement

30 – Intelligence Requirements Definitions

31 – Sample Intelligence Requirements

32 – Action Items

33 – Summary

34 – What is Next

35 – Introduction

36 – Intelligence Sources

37 – Internal Sources

38 – Open Source OSINT

39 – Commercial Sources

40 – Trusted Communities

41 – Collection Plans

42 – Action Plans

43 – Summary

44 – What is Next

45 – Introduction

46 – Courses of Action COAs

47 – Service catalogue Part 1

48 – Service catalogue Part 2

49 – Service catalogue Part 3

50 – Communication Plans

51 – Service Level Agreements SLAs

52 – Action Items

53 – Summary

54 – What is Next

55 – Introduction

56 – Data Collection Part 1

57 – Data Collection Part 2

58 – Operational Security OPSec

59 – Research and investigation Preconfigured virtual machines and other tools

60 – Tracking systems

61 – Where are your tools going to live

62 – Actions Items

63 – Summary

64 – What is Next

65 – Introduction

66 – Operational metrics Part 1

67 – Operational metrics Part 2

68 – Reporting Part 1

69 – Reporting Part 2

70 – Action Items

71 – Summary

72 – What is Next

73 – Introduction

74 – What can CTI do for an organization

75 – Organization support for the CTI program

76 – Action Items

77 – Summary

78 – What is Next


Discover more from Expert Training

Subscribe to get the latest posts sent to your email.

Reviews

There are no reviews yet.

Only logged in customers who have purchased this product may leave a review.