TRAINING CATEGORIES
(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit


IT-S 159 - Threat Intelligence

Code Start Date Duration Venue
IT-S 159 05 August 2024 5 Days Istanbul Registration Form Link
IT-S 159 30 September 2024 5 Days Istanbul Registration Form Link
IT-S 159 28 October 2024 5 Days Istanbul Registration Form Link
IT-S 159 25 November 2024 5 Days Istanbul Registration Form Link
IT-S 159 23 December 2024 5 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

This training program is designed and developed to help organizations identify and mitigate business risks by converting unknown internal and external threats into known threats. It is a comprehensive specialist-level program that teaches a structured approach for building effective threat intelligence. It will enable participants understand Threat Intelligence lifecycle and framework. It empowers them with the latest techniques and tools to detect, engage, and neutralize cyberattacks in real time. 

Course Objectives

  • Discuss the importance of threat intelligence in risk management, SIEM, and incident response.
  • Understand various cyber threats, threat actors, and their objectives for cyberattacks.
  • Learn the fundamentals of threat intelligence 
  • Explore cyber kill chain methodology, Advanced Persistent Threat (APT), Indicators of Compromise (IoCs), and the pyramid of pain.
  • Develop threat intelligence program steps (Requirements, Planning, Direction, Review).
  • Understand the types of data feeds, sources, and data collection methods.

Who Should Attend?

  • Ethical Hackers
  • Security Professionals 
  • Threat Intelligence Analysts
  • Digital Forensic and Malware Analysts
  • Incident Response Team Members

Course Details/Schedule

Day 1

  • Key issues in the InfoSec domain
  • Vulnerability assessment and scoring severity of vulnerability w.r.t environment
  • Assigning a Confidence Value and Validating Exploitative Potential of Vulnerabilities
  • Enhanced Vulnerability Scanning

Day 2

  • Risk Assessment Matrices and Rating Systems
  • Quantitative Analysis Techniques Applied to Vulnerability Scoring
  • Importance of threat intelligence in risk management, SIEM, and incident response
  • Various cyber threats, threat actors, and their objectives for cyberattacks

Day 3

  • Cyber kill chain methodology, Advanced Persistent Threat (APT), Indicators of Compromise (IoCs), and
  • the pyramid of pain
  • Managing Large Repositories of Vulnerability Data
  • Evaluating Vulnerability Risk in Custom and Unique Systems, including Web Applications
  • Triage: Assessing the Relative Importance of Vulnerabilities Against Strategic Risk

Day 4

Types of data feeds, sources, and data collection methods.

  • Threat intelligence data collection and acquisition through Open-Source Intelligence (OSINT), Human
  • Intelligence (HUMINT), Cyber Counterintelligence (CCI), Indicators of Compromise (IoCs), and malware
  • analysis
  • Complete threat analysis process including threat modeling, fine-tuning, evaluation, runbook, and
  • knowledge base creation
  • Complete threat analysis process including threat modeling, fine-tuning, evaluation, runbook, and
  • knowledge base creation

Day 5

  • Different data analysis, threat modeling, and threat intelligence tools
  • Creating effective threat intelligence reports
  • The Fundamental Skillset: Intrusion Analysis
  • Hunting and responding to advanced adversaries such as nation-state actors, organized crime, and
  • hacktivists