HOME > IT & Software > Cyber Threat Intelligence

Cyber Threat Intelligence

SynopsisCyber Threat Intelligence, available at $44.99, has an averag...
Cyber Threat Intelligence  No.1

Cyber Threat Intelligence, available at $44.99, has an average rating of 4.57, with 145 lectures, based on 246 reviews, and has 1754 subscribers.

You will learn about Understand typical behavior patterns of adversaries, enabling you to predict and mitigate potential security breaches. Learn to effectively identify and analyze a wide range of cyber threats and to enable threat-informed defenses. Comprehensive Understanding of MITRE ATT&CK Explore industry best practices around CTI This course is ideal for individuals who are SOC Analyst or Security Engineer or Security Consultant or Security Architect or Security Manager or CISO or Red Team or Blue Team or Cybersecurity Professional or Ethical Hacker or Penetration Tester or Incident Handler It is particularly useful for SOC Analyst or Security Engineer or Security Consultant or Security Architect or Security Manager or CISO or Red Team or Blue Team or Cybersecurity Professional or Ethical Hacker or Penetration Tester or Incident Handler.

Enroll now: Cyber Threat Intelligence

Summary

Title: Cyber Threat Intelligence

Price: $44.99

Average Rating: 4.57

Number of Lectures: 145

Number of Published Lectures: 145

Number of Curriculum Items: 145

Number of Published Curriculum Objects: 145

Original Price: $19.99

Quality Status: approved

Status: Live

What You Will Learn

  • Understand typical behavior patterns of adversaries, enabling you to predict and mitigate potential security breaches.
  • Learn to effectively identify and analyze a wide range of cyber threats and to enable threat-informed defenses.
  • Comprehensive Understanding of MITRE ATT&CK
  • Explore industry best practices around CTI
  • Who Should Attend

  • SOC Analyst
  • Security Engineer
  • Security Consultant
  • Security Architect
  • Security Manager
  • CISO
  • Red Team
  • Blue Team
  • Cybersecurity Professional
  • Ethical Hacker
  • Penetration Tester
  • Incident Handler
  • Target Audiences

  • SOC Analyst
  • Security Engineer
  • Security Consultant
  • Security Architect
  • Security Manager
  • CISO
  • Red Team
  • Blue Team
  • Cybersecurity Professional
  • Ethical Hacker
  • Penetration Tester
  • Incident Handler
  • Cyber Threat Intelligence (CTI) by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to master CTI to empower threat-informed defenses. This course systematically guides you from the basis to advanced concepts of CTI.

    By mastering CTI, you’re developing expertise in essential topics in today’s cybersecurity landscape. Through this course, you’ll develop expertise in CTI, a comprehensive topic widely recognized for understanding tactics, techniques and procedures of adversaries and defending against cyber threats.

    This deep dive into CTI equips you with the skills necessary for a cutting-edge career in cybersecurity.

    Key Benefits for you:

  • SOC Basics: Understand the foundational structures of Security Operations Centers and their role in cybersecurity.

  • Azure Basics: Gain essential knowledge of Microsoft Azure’s infrastructure.

  • Zero Trust Basics: Learn the principles of the Zero Trust security model.

  • Intelligence: Explore the methods of collecting and analyzing data to predict and prevent threats.

  • CTI: Delve into the core techniques of Cyber Threat Intelligence to identify potential threats before they impact.

  • CTI Related Frameworks: Discover various frameworks that enhance the effectiveness of CTI  processes.

  • MITRE ATT&CK: Study this globally-accessible knowledge base of adversary tactics and techniques.

  • Threat Actors and Advanced Persistent Threats: Identify common adversaries in cyber warfare.

  • CTI Tools: Get hands-on experience with the tools that professionals use for CTI gathering and analysis.

  • CTI Platforms: Familiarize yourself with platforms specifically designed for managing and operationalizing CTI.

  • AI & CTI: Explore the intersection of Artificial Intelligence and CTI to enhance threat detection.

  • Case Study I – MISP on Azure: Analyze how the MISP threat intelligence platform can be implemented on Azure to manage CTI.

  • Case Study II: Researching APT41 with ATT&CK: Understand the approach to investigating the TTPs of APT41 using the MITRE ATT&CK framework.

  • Case Study III: Leveraging CTI in Microsoft Sentinel: See practical applications of CTI in enhancing Microsoft Sentinel’s threat detection capabilities.

  • Case Study IV: Building a CTI Program: Learn from a comprehensive blueprint on setting up a successful CTI program within an organization.

  • Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Welcome

    Lecture 2: Course Slides

    Lecture 3: IMPORTANT – Basics

    Lecture 4: IMPORTANT – Demos

    Lecture 5: FAQs

    Chapter 2: Basics – SOC

    Lecture 1: Complexity and Cyber Security Challenges

    Lecture 2: What is a SOC?

    Lecture 3: SOC Model

    Lecture 4: Cyber Security Incident Response Process

    Lecture 5: EDR, XDR, SIEM & SOAR

    Lecture 6: Blue, Red and Purple Teaming

    Chapter 3: Basics – Azure

    Lecture 1: Cloud Computing Properties

    Lecture 2: Cloud Computing Types

    Lecture 3: Azure Global Backbone

    Lecture 4: Shared Responsibility Model

    Lecture 5: Azure Resource Hierarchy

    Lecture 6: Azure Subscription Types

    Lecture 7: Entra ID Tenants and Azure Subscriptions

    Chapter 4: Basics – Zero Trust & Microsoft Security

    Lecture 1: What is Zero Trust?

    Lecture 2: The Microsoft Security Cosmos

    Lecture 3: Defending Across Attack Chains

    Chapter 5: Intelligence

    Lecture 1: What is Intelligence?

    Lecture 2: Observe, Orient, Decide & Act

    Lecture 3: The Intelligence Cycle

    Lecture 4: Analysis of Competing Hypotheses (ACH)

    Lecture 5: The Traffic Light Protocol (TLP)

    Lecture 6: Sources of Intelligence

    Lecture 7: Levels of Intelligence

    Chapter 6: Cyber Threat Intelligence (CTI)

    Lecture 1: What is CTI?

    Lecture 2: Intelligence, Threat Intelligence and Cyber Threat Intelligence

    Lecture 3: What is a Threat?

    Lecture 4: Threat, Vulnerability & Risk

    Lecture 5: Threat-informed Defense

    Lecture 6: Tactics, Techniques & Procedures (TTPs)

    Lecture 7: IOCs and IOAs

    Lecture 8: Indicator Lifecycle

    Lecture 9: Pyramid of Pain

    Lecture 10: Pivoting

    Lecture 11: Threat Hunting

    Lecture 12: CTI Sources

    Chapter 7: CTI-Related Frameworks

    Lecture 1: Diamond Model

    Lecture 2: Lockheed Martin Cyber Kill Chain

    Lecture 3: MITRE ATT&CK

    Chapter 8: MITRE ATT&CK

    Lecture 1: Mapping ATT&CK to the Pyramid of Pain

    Lecture 2: Matrices

    Lecture 3: Tactics

    Lecture 4: Techniques

    Lecture 5: Subtechniques

    Lecture 6: Tactics, Techniques & Subtechniques

    Lecture 7: Data Sources

    Lecture 8: Detections

    Lecture 9: Mitigations

    Lecture 10: Groups

    Lecture 11: Software

    Lecture 12: Campaigns

    Lecture 13: Relations

    Lecture 14: Speaking one language

    Lecture 15: Threat-Informed Decision Making

    Lecture 16: Demo: Enterprise Matrix

    Lecture 17: Demo: ATT&CK Navigator

    Lecture 18: Purple Teaming with ATT&CK

    Lecture 19: Evolution of ATT&CK

    Chapter 9: Threat Actors and APTs

    Lecture 1: Threat Actors: Types & Motivations

    Lecture 2: APT: Sandworm & NotPetya

    Chapter 10: CTI Tools

    Lecture 1: Demo: Install VirtualBox

    Lecture 2: Demo: Install Kali Linux

    Lecture 3: Demo: Configure Kali Keyboard Layout

    Lecture 4: Demo: whois

    Lecture 5: Demo: TheHarvester

    Lecture 6: Demo: Spiderfoot

    Chapter 11: CTI Platforms

    Lecture 1: Demo: Pulsedive

    Lecture 2: Demo: Shodan.io

    Lecture 3: Demo: VirusTotal

    Chapter 12: CTI Platforms II – Microsoft Defender XDR

    Lecture 1: Demo: Activate and Assign Microsoft 365 E5

    Lecture 2: What is Defender XDR?

    Lecture 3: Demo: Configure RBAC

    Lecture 4: Demo: Threat Analytics

    Lecture 5: Demo: Intel Profiles

    Lecture 6: Demo: Intel Explorer

    Chapter 13: Generative & CTI

    Lecture 1: What is an LLM?

    Lecture 2: MITRE ATLAS

    Lecture 3: Demo: Describe CTI

    Lecture 4: Demo: Assist with IOCs

    Lecture 5: Demo: Generate Threat Hunting Queries in KQL

    Lecture 6: Demo: Generating YARA Rules

    Chapter 14: Case Study I – MISP on Azure

    Lecture 1: Scenario

    Instructors

  • Cyber Threat Intelligence  No.2
    Christopher Nett
    Cyber Security Architect | Cloud Security | Zero Trust
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 3 votes
  • 3 stars: 21 votes
  • 4 stars: 79 votes
  • 5 stars: 143 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!