Tags
Language
Tags
September 2025
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cyber Threat Intelligence

    Posted By: ELK1nG
    Cyber Threat Intelligence

    Cyber Threat Intelligence
    Published 4/2024
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.15 GB | Duration: 7h 24m

    Learn Cyber Threat Intelligence | Hands-on experience | Elevate your career to the next level

    What you'll learn

    Understand typical behavior patterns of adversaries, enabling you to predict and mitigate potential security breaches.

    Learn to effectively identify and analyze a wide range of cyber threats and to enable threat-informed defenses.

    Comprehensive Understanding of MITRE ATT&CK

    Explore industry best practices around CTI

    Requirements

    Willingness to learn cool stuff!

    Basic IT Knowledge

    Description

    Cyber Threat Intelligence (CTI) by Christopher Nett is a meticulously organized Udemy course designed for IT professionals aiming to master CTI to empower threat-informed defenses. This course systematically guides you from the basis to advanced concepts of CTI.By mastering CTI, you're developing expertise in essential topics in today's cybersecurity landscape. Through this course, you'll develop expertise in CTI, a comprehensive topic widely recognized for understanding tactics, techniques and procedures of adversaries and defending against cyber threats. This deep dive into CTI equips you with the skills necessary for a cutting-edge career in cybersecurity.Key Benefits for you:SOC Basics: Understand the foundational structures of Security Operations Centers and their role in cybersecurity.Azure Basics: Gain essential knowledge of Microsoft Azure's infrastructure.Zero Trust Basics: Learn the principles of the Zero Trust security model.Intelligence: Explore the methods of collecting and analyzing data to predict and prevent threats.CTI: Delve into the core techniques of Cyber Threat Intelligence to identify potential threats before they impact.CTI Related Frameworks: Discover various frameworks that enhance the effectiveness of CTI  processes.MITRE ATT&CK: Study this globally-accessible knowledge base of adversary tactics and techniques.Threat Actors and Advanced Persistent Threats: Identify common adversaries in cyber warfare.CTI Tools: Get hands-on experience with the tools that professionals use for CTI gathering and analysis.CTI Platforms: Familiarize yourself with platforms specifically designed for managing and operationalizing CTI.AI & CTI: Explore the intersection of Artificial Intelligence and CTI to enhance threat detection.Case Study I - MISP on Azure: Analyze how the MISP threat intelligence platform can be implemented on Azure to manage CTI.Case Study II: Researching APT41 with ATT&CK: Understand the approach to investigating the TTPs of APT41 using the MITRE ATT&CK framework.Case Study III: Leveraging CTI in Microsoft Sentinel: See practical applications of CTI in enhancing Microsoft Sentinel's threat detection capabilities.Case Study IV: Building a CTI Program: Learn from a comprehensive blueprint on setting up a successful CTI program within an organization.

    Overview

    Section 1: Introduction

    Lecture 1 Welcome & About your Instructor

    Lecture 2 Course Slides

    Lecture 3 IMPORTANT - Basics

    Lecture 4 IMPORTANT - Demos

    Lecture 5 FAQs

    Section 2: Basics - SOC

    Lecture 6 Complexity and Cyber Security Challenges

    Lecture 7 What is a SOC?

    Lecture 8 SOC Model

    Lecture 9 Cyber Security Incident Response Process

    Lecture 10 EDR, XDR, SIEM & SOAR

    Lecture 11 Blue, Red and Purple Teaming

    Section 3: Basics - Azure

    Lecture 12 Cloud Computing Properties

    Lecture 13 Cloud Computing Types

    Lecture 14 Azure Global Backbone

    Lecture 15 Shared Responsibility Model

    Lecture 16 Azure Resource Hierarchy

    Lecture 17 Azure Subscription Types

    Lecture 18 Entra ID Tenants and Azure Subscriptions

    Section 4: Basics - Zero Trust & Microsoft Security

    Lecture 19 What is Zero Trust?

    Lecture 20 The Microsoft Security Cosmos

    Lecture 21 Defending Across Attack Chains

    Section 5: Lab Setup - Kali Linux

    Lecture 22 Demo: Install VirtualBox

    Lecture 23 Demo: Install Kali Linux

    Lecture 24 Demo: Configure Kali Keyboard Layout

    Section 6: Intelligence

    Lecture 25 What is Intelligence?

    Lecture 26 Observe, Orient, Decide & Act

    Lecture 27 The Intelligence Cycle

    Lecture 28 Analysis of Competing Hypotheses (ACH)

    Lecture 29 The Traffic Light Protocol (TLP)

    Lecture 30 Sources of Intelligence

    Lecture 31 Levels of Intelligence

    Section 7: Cyber Threat Intelligence (CTI)

    Lecture 32 What is CTI?

    Lecture 33 Intelligence, Threat Intelligence and Cyber Threat Intelligence

    Lecture 34 What is a Threat?

    Lecture 35 Threat, Vulnerability & Risk

    Lecture 36 Threat-informed Defense

    Lecture 37 Tactics, Techniques & Procedures (TTPs)

    Lecture 38 IOCs and IOAs

    Lecture 39 Indicator Lifecycle

    Lecture 40 Pyramid of Pain

    Lecture 41 Pivoting

    Lecture 42 Threat Hunting

    Lecture 43 CTI Sources

    Section 8: CTI-Related Frameworks

    Lecture 44 Diamond Model

    Lecture 45 Lockheed Martin Cyber Kill Chain

    Lecture 46 MITRE ATT&CK

    Section 9: MITRE ATT&CK

    Lecture 47 Mapping ATT&CK to the Pyramid of Pain

    Lecture 48 Matrices

    Lecture 49 Tactics

    Lecture 50 Techniques

    Lecture 51 Subtechniques

    Lecture 52 Tactics, Techniques & Subtechniques

    Lecture 53 Data Sources

    Lecture 54 Detections

    Lecture 55 Mitigations

    Lecture 56 Groups

    Lecture 57 Software

    Lecture 58 Campaigns

    Lecture 59 Relations

    Lecture 60 Speaking one language

    Lecture 61 Threat-Informed Decision Making

    Lecture 62 Demo: Enterprise Matrix

    Lecture 63 Demo: ATT&CK Navigator

    Lecture 64 Purple Teaming with ATT&CK

    Lecture 65 Evolution of ATT&CK

    Section 10: Threat Actors and APTs

    Lecture 66 Threat Actors: Types & Motivations

    Lecture 67 APT: Sandworm & NotPetya

    Section 11: CTI Tools

    Lecture 68 Demo: whois

    Lecture 69 Demo: TheHarvester

    Lecture 70 Demo: Spiderfoot

    Section 12: CTI Platforms

    Lecture 71 Demo: Pulsedive

    Lecture 72 Demo: Shodan.io

    Lecture 73 Demo: VirusTotal

    Section 13: Artificial Intelligence (AI) & CTI

    Lecture 74 What is an LLM?

    Lecture 75 MITRE ATLAS

    Lecture 76 Demo: ChatGPT for CTI

    Section 14: Case Study I - MISP on Azure

    Lecture 77 Scenario

    Lecture 78 Your Free Azure Subscription

    Lecture 79 Demo: Install Azure CLI

    Lecture 80 Demo: Create a Resource Group

    Lecture 81 Demo: Create an Azure Virtual Machine

    Lecture 82 Demo: Install MISP on Azure VM

    Lecture 83 Demo: MISP

    Section 15: Case Study II - Researching APT41 with ATT&CK

    Lecture 84 Scenario

    Lecture 85 Campaigns & The Groups

    Lecture 86 Tactics, Techniques & Subtechniques

    Lecture 87 Detections & Mitigations

    Lecture 88 Pyramid of Pain for the Campaign

    Section 16: Case Study III - Leveraging CTI in Microsoft Sentinel

    Lecture 89 Scenario

    Lecture 90 What is Microsoft Sentinel?

    Lecture 91 Sentinel as SaaS

    Lecture 92 Sentinel Architecture

    Lecture 93 Deployment Prerequisites

    Lecture 94 Azure Log Analytics

    Lecture 95 Data Connectors

    Lecture 96 Content Hub

    Lecture 97 Typical Data Sources for a SIEM

    Lecture 98 CTI in Sentinel

    Lecture 99 Demo: Create an Azure Subscription

    Lecture 100 Demo: Create a Resource Group

    Lecture 101 Demo: Create a Log Analytics Workspace

    Lecture 102 Demo: Create a Sentinel Workspace

    Lecture 103 Sentinel RBAC

    Lecture 104 Demo: Sentinel RBAC

    Lecture 105 Demo: Sentinel Content Hub

    Lecture 106 Demo: Ingesting a Threat Feed into Sentinel

    Lecture 107 Demo: Verify Threat Feed log ingestion

    Lecture 108 Demo: Ingest Entra ID

    Lecture 109 Demo: Verify Entra ID Ingestion

    Lecture 110 Demo: CTI in Sentinel

    Lecture 111 Demo: ATT&CK in Sentinel

    Lecture 112 KQL 101

    Lecture 113 Demo: KQL 101

    Lecture 114 Demo: Threat Hunting in Sentinel

    Lecture 115 Demo: Hunting for Entra ID Events

    Lecture 116 Analytic Rules

    Lecture 117 Scheduled Rules

    Lecture 118 Demo: Scheduled Rules

    Lecture 119 NRT Rules

    Lecture 120 Demo: NRT Rules

    Lecture 121 Threat Intelligence Rules

    Lecture 122 Demo: Threat Intelligence Rules

    Lecture 123 Playbooks

    Lecture 124 Azure Logic Apps

    Lecture 125 Demo: Playbooks with ChatGPT

    Lecture 126 Notebooks

    Lecture 127 Notebooks with MSTICPy

    Section 17: Case Study IV - Building a CTI Program

    Lecture 128 Scenario & Objectives

    Lecture 129 Steps to building the CTI Program

    Lecture 130 Define Strategic Goals

    Lecture 131 Identify Key Intelligence Requirements

    Lecture 132 Establish Processes and Tools

    Lecture 133 Intelligence-Driven SecOps and DFIR

    Lecture 134 Continuous Improvement

    Lecture 135 Conclusion

    Section 18: Bonus Section

    Lecture 136 Bonus

    SOC Analyst,Security Engineer,Security Consultant,Security Architect,Security Manager,CISO,Red Team,Blue Team,Cybersecurity Professional,Ethical Hacker,Penetration Tester,Incident Handler