Cyber Security Threat Intelligence Researcher Preview

UDAO
Cyber Security Threat Intelligence Researcher Preview

About this course

In this course, we’ll introduce you to the 8 phases of threat intelligence:

  • Hunting - The goal of hunting is to establish techniques to collect samples from different sources that help to start profiling malicious threat actors.

  • Features Extraction - The goal of Features Extraction is to identify unique Static features in the binaries that help to classify them into a specific malicious group.

  • Behavior Extraction - The goal of Behavior Extraction is to identify unique Dynamic features in the binaries that help to classify them into a specific malicious group.

  • Clustering and Correlation -  The goal of Clustering and Correlation is to classify malware based on Features and Behavior extracted and correlate the information to understand the attack flow.

  • Threat Actor Attribution - The goal of Threat Actors is to locate the threat actors behind the malicious clusters identified.

  • Tracking - The goal of tracking is to anticipate new attacks and identify new variants proactively.

  • Taking Down - The goal of Taking down is to Dismantled Organized Crime Operations.

What you should already know

Familiar with cyber exploits and breaches that have occurred in the public

What you will learn

  • A high level overview of the 7 threat intelligence phases

  • Hunting - The goal of hunting is to establish techniques to collect samples from different sources that help to start profiling malicious threat actors.

  • Features Extraction - goal of Features Extraction is to identify unique Static features in the binaries that help to classify them into a specific malicious group.

  • Behavior Extraction - The goal of Behavior Extraction is to identify unique Dynamic features in the binaries that help to classify them into a specific malicious group.

  • Clustering and Correlation - The goal of Clustering and Correlation is to classify malware based on Features and Behavior extracted and correlate the information to understand the attack flow.

  • Threat Actor Attribution - The goal of Threat Actors is to locate the threat actors behind the malicious clusters identified.

  • Tracking - The goal of tracking is to anticipate new attacks and identify new variants proactively.

  • Taking Down - The goal of Taking down is to Dismantled Organized Crime Operations.

Reviews

Free