Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Certified Cyber Threat Intelligence Analyst
1.PHASE OVERVIEW
1.Threat Intelligence Researcher Course (6:43)
2.Phases Overview Part 1 (7:28)
3.Phases Overview Part 2 (5:39)
4.Phases Overview Part 3 (5:29)
5.Hunting Part 1 (6:11)
6.Hunting Part 2 (9:22)
7.Features Extraction Part 1 (7:50)
8.Features Extraction Part 2 (7:17)
9.Behavior Extraction Part 1 (6:52)
10.Behavior Extraction Part 2 (5:54)
11.Behavior Extraction Part 3 (5:54)
12.Clustering and Correlation (8:04)
13.Threat Actor Attribution Part 1 (5:27)
14.Threat Actor Attribution Part 2 (5:58)
15.Tracking (5:46)
16.Take Down (8:12)
2.HUNTING
1.VirusTotal Part 1 (7:41)
2.VirusTotal Part 2 (7:02)
3.Hacking Forums Part 1 (7:05)
4.Hacking Forums Part 2 (5:18)
5.Hacking Forums Part 3 (5:13)
6.DeepWeb Part 1 (7:07)
7.DeepWeb Part 2 (8:09)
8.Honeypot and OSINT (10:06)
9.VirusTotal Intelligence (38:07)
10.Binary-Level Detection with Yara (32:36)
3.FEATURES EXTRACTION
1.Features Extraction Goal Part 1 (6:28)
2.Features Extraction Goal Part 2 (6:36)
3.Import Table Hash (imphash) Part 1 (6:22)
4.Import Table Hash (imphash) Part 2 (8:18)
5.Fuzzy Hash (ssdeep) (6:14)
6.Strings (9:05)
7.Extracting VBA Macros with Didier Stevens Tools (22:27)
8.Lab C2 IP Pivoting (17:17)
4.BEHAVIOR EXTRACTION
1.Dynamic Indicators Part 1 (8:09)
2.Dynamic Indicators Part 2 (5:42)
3.Dynamic Indicators Part 3 (7:00)
4.Dynamic Indicators Part 4 (6:20)
5.Process Infector and Keyloggers (7:13)
6.Passive DNS (DNSDB) Part 1 (8:14)
7.Passive DNS (DNSDB) Part 2 (5:55)
5.CLUSTERING & CORRELATION
1.How Clustering & Correlation Works Part 1 (7:59)
2.How Clustering & Correlation Works Part 2 (5:10)
3.How Clustering & Correlation Works Part 3 (5:53)
4.How Clustering & Correlation Works Part 4 (5:25)
5.GraphDB Part 1 (6:26)
6.GraphDB Part 2 (5:14)
6.ATTRIBUTION
1.Where are they Located Part 1 (7:50)
2.Where are they Located Part 2 (8:55)
3.Who are the Targets (7:13)
4.Initial Compromise (7:02)
5.Privilege Escalation (7:07)
6.Persistence (5:57)
7.Lateral Movement Part 1 (6:43)
8.Lateral Movement Part 2 (5:41)
9.Exfiltration Strategy (9:01)
10.Profiling the Attacker (6:42)
7.TRACKING
1.Passive DNS & Internet Port Scan Part 1 (7:17)
2.Passive DNS & Internet Port Scan Part 2 (6:21)
3.Passive DNS & Internet Port Scan Part 3 (4:59)
4.Passive DNS & Internet Port Scan Part 4 (3:52)
5.Lookups, OSINT, and Hacking Forums Part 1 (6:35)
6.Lookups, OSINT, and Hacking Forums Part 2 (9:56)
8.TAKING DOWN
1.Sinkhole Part 1 (6:45)
2.Sinkhole Part 2 (9:56)
3.How it works Part 1 (6:50)
4.How it works Part 2 (9:17)
5.Hacking Forums (5:30)
6.Victims Notification (6:40)
Teach online with
2.Where are they Located Part 2
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock