Course curriculum

    1. Segment 00: Welcome and Course Goals

    2. Segment 01: Threat Actor Types and Attribution

    3. Segment 02: Threat Modeling Frameworks

    4. Segment 03: Legal Ethical and Policy Considerations

    1. Segment 04: Intelligence Collection Methodologies

    2. Segment 05: Threat Infrastructure Analysis

    3. Segment 06: Malware and Campaign Correlation

    1. Segment 07: Data Enrichment and Validation

    2. Segment 08: Analytical Methodologies

    3. Segment 09: Attribution and Profiling

    4. Segment 10: Reading - What Are Threat Intelligence Tools?

    5. Segment 11: Hands-On-Learning - Analyzing Malware and Tracking Threat Campaigns with Sandboxes and Intel Repositories

    6. Segment 12: Quiz - Data Analysis and Validation

    1. Segment 13: Analysis of Competing Hypotheses (ACH)

    2. Segment 14: Red Teaming

    3. Segment 15: Scenario Modelling

    1. Segment 16: Attribution Frameworks

    2. Segment 17: Attribution Challenges

    3. Segment 18: Attribution Case study examples

    1. Segment 19: Intelligence Confidence Language

    2. Segment 20: Threat Modelling for Enterprise Risk

    3. Segment 21: Threat Model Design Using NIST 800-30 or STRIDE

    4. Segment 22: Reading - Five Key Steps to Delivering Intelligence Reports that Your Board Actually Reads

    5. Segment 23: Hands-On-Learning - Create a 3-Minute "Threat Update" Presentation

    6. Segment 24: Quiz - Intelligence Confidence and Enterprise Risk Modelling

About this course

  • Free
  • 50 lessons
  • 3.5 hours of video content

Discover your potential, starting today