(Click Category to List Courses)
42 - IT-S Information Technology - Security and Audit
IT-S 159 - Threat Intelligence
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-S 159 | 28 October 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 159 | 25 November 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 159 | 23 December 2024 | 5 Days | Istanbul | Registration Form Link |
Course Description
This training program is designed and developed to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program that teaches a structured approach for building effective threat intelligence. It will enable participants understand Threat Intelligence lifecycle and framework. It empowers them with the latest techniques and tools to detect, engage, and neutralize cyberattacks in real time.
Course Objectives
- Discuss the importance of threat intelligence in risk management, SIEM, and incident response.
- Understand various cyber threats, threat actors, and their objectives for cyberattacks.
- Learn the fundamentals of threat intelligence
- Explore cyber kill chain methodology, Advanced Persistent Threat (APT), Indicators of Compromise (IoCs), and the pyramid of pain.
- Develop threat intelligence program steps (Requirements, Planning, Direction, Review).
- Understand the types of data feeds, sources, and data collection methods.
Who Should Attend?
- Ethical Hackers
- Security Professionals
- Threat Intelligence Analysts
- Digital Forensic and Malware Analysts
- Incident Response Team Members
Course Details/Schedule
Day 1
- Key issues in the InfoSec domain
- Vulnerability assessment and scoring severity of vulnerability w.r.t environment
- Assigning a Confidence Value and Validating Exploitative Potential of Vulnerabilities
- Enhanced Vulnerability Scanning
Day 2
- Risk Assessment Matrices and Rating Systems
- Quantitative Analysis Techniques Applied to Vulnerability Scoring
- Importance of threat intelligence in risk management, SIEM, and incident response
- Various cyber threats, threat actors, and their objectives for cyberattacks
Day 3
- Cyber kill chain methodology, Advanced Persistent Threat (APT), Indicators of Compromise (IoCs), and
- the pyramid of pain
- Managing Large Repositories of Vulnerability Data
- Evaluating Vulnerability Risk in Custom and Unique Systems, including Web Applications
- Triage: Assessing the Relative Importance of Vulnerabilities Against Strategic Risk
Day 4
Types of data feeds, sources, and data collection methods.
- Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human
- Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), and malware
- analysis
- Complete threat analysis process including threat modeling, fine-tuning, evaluation, runbook, and
- knowledge base creation
- Complete threat analysis process including threat modeling, fine-tuning, evaluation, runbook, and
- knowledge base creation
Day 5
- Different data analysis, threat modeling, and threat intelligence tools
- Creating effective threat intelligence reports
- The Fundamental Skillset: Intrusion Analysis
- Hunting and responding to advanced adversaries such as nation-state actors, organized crime, and
- hacktivists