This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Cyber Threat Intelligence Analyst
1.PHASE OVERVIEW
1.Threat Intelligence Researcher Course (6:43)
2.Phases Overview Part 1 (7:28)
3.Phases Overview Part 2 (5:39)
4.Phases Overview Part 3 (5:29)
5.Hunting Part 1 (6:11)
6.Hunting Part 2 (9:22)
7.Features Extraction Part 1 (7:50)
8.Features Extraction Part 2 (7:17)
9.Behavior Extraction Part 1 (6:52)
10.Behavior Extraction Part 2 (5:54)
11.Behavior Extraction Part 3 (5:54)
12.Clustering and Correlation (8:04)
13.Threat Actor Attribution Part 1 (5:27)
14.Threat Actor Attribution Part 2 (5:58)
15.Tracking (5:46)
16.Take Down (8:12)
2.HUNTING
1.VirusTotal Part 1 (7:41)
2.VirusTotal Part 2 (7:02)
3.Hacking Forums Part 1 (7:05)
4.Hacking Forums Part 2 (5:18)
5.Hacking Forums Part 3 (5:13)
6.DeepWeb Part 1 (7:07)
7.DeepWeb Part 2 (8:09)
8.Honeypot and OSINT (10:06)
9.VirusTotal Intelligence (38:07)
10.Binary-Level Detection with Yara (32:36)
3.FEATURES EXTRACTION
1.Features Extraction Goal Part 1 (6:28)
2.Features Extraction Goal Part 2 (6:36)
3.Import Table Hash (imphash) Part 1 (6:22)
4.Import Table Hash (imphash) Part 2 (8:18)
5.Fuzzy Hash (ssdeep) (6:14)
6.Strings (9:05)
7.Extracting VBA Macros with Didier Stevens Tools (22:27)
8.Lab C2 IP Pivoting (17:17)
4.BEHAVIOR EXTRACTION
1.Dynamic Indicators Part 1 (8:09)
2.Dynamic Indicators Part 2 (5:42)
3.Dynamic Indicators Part 3 (7:00)
4.Dynamic Indicators Part 4 (6:20)
5.Process Infector and Keyloggers (7:13)
6.Passive DNS (DNSDB) Part 1 (8:14)
7.Passive DNS (DNSDB) Part 2 (5:55)
5.CLUSTERING & CORRELATION
1.How Clustering & Correlation Works Part 1 (7:59)
2.How Clustering & Correlation Works Part 2 (5:10)
3.How Clustering & Correlation Works Part 3 (5:53)
4.How Clustering & Correlation Works Part 4 (5:25)
5.GraphDB Part 1 (6:26)
6.GraphDB Part 2 (5:14)
6.ATTRIBUTION
1.Where are they Located Part 1 (7:50)
2.Where are they Located Part 2 (8:55)
3.Who are the Targets (7:13)
4.Initial Compromise (7:02)
5.Privilege Escalation (7:07)
6.Persistence (5:57)
7.Lateral Movement Part 1 (6:43)
8.Lateral Movement Part 2 (5:41)
9.Exfiltration Strategy (9:01)
10.Profiling the Attacker (6:42)
7.TRACKING
1.Passive DNS & Internet Port Scan Part 1 (7:17)
2.Passive DNS & Internet Port Scan Part 2 (6:21)
3.Passive DNS & Internet Port Scan Part 3 (4:59)
4.Passive DNS & Internet Port Scan Part 4 (3:52)
5.Lookups, OSINT, and Hacking Forums Part 1 (6:35)
6.Lookups, OSINT, and Hacking Forums Part 2 (9:56)
8.TAKING DOWN
1.Sinkhole Part 1 (6:45)
2.Sinkhole Part 2 (9:56)
3.How it works Part 1 (6:50)
4.How it works Part 2 (9:17)
5.Hacking Forums (5:30)
6.Victims Notification (6:40)
1.Dynamic Indicators Part 1
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock