Cybersecurity Threat Intelligence Engineering | Cybersecurity | InfosecTrain

Cybersecurity Threat Intelligence Engineering | Cybersecurity | InfosecTrain

HomeINFOSEC TRAINCybersecurity Threat Intelligence Engineering | Cybersecurity | InfosecTrain
Cybersecurity Threat Intelligence Engineering | Cybersecurity | InfosecTrain
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
InfosecTrain offers cybersecurity training and certifications. For more information about cybersecurity courses and other training we conduct, visit https://www.infosectrain.com/pages/lp/cyber-security/ or write to us at [email protected]

#CyberSecurity #CyberThreatIntelligence #SecurityTraining

00:00 Introduction
00:10 Assets, risks, attacks
01:40 Threats
08:20 Risk
17:55 Hacking
28:45 Data, information, intelligence
34:05 Information on cyber threats
46:05 Different phases of CTI
50:00 Planning and management
51:40 Collection
52:40 Processing
53:35 Distribution
54:30 Types of threat intelligence
57:55 Tactics
58:15 Strategic
58:30 Tactics
59:02 Ready for operation
59:22 Technical
59:45 Threat intelligence
01:02:25 Risk management
01:04:25 Incident triage
01:06:05 Incident processing
01:18:05 Types of losses
01:22:10 Threat intelligence lifecycle
01:25:25 Analysis
01:28:28 Threat intelligence maturity model
01:29:42 Threat intelligence frameworks
01:39:05 Cybersecurity attack vectors
01:40:30 Threat, Ability, Opportunity Triand
01:43:00 APT
01:48:18 Real-time cyber threat map
01:50:45 The hacker news
01:56:00 Cyber Kill Chain
02:07:10 TTP
02:17:20 Pyramid of Pain
02:30:00 Mitre Attacks
02:39:25 Website
02:41:20 CTF
02:42:40 CEHV10
02:46:22 Life cycle of attacks (kill chain)
02:46:30 Enlightenment
02:52:25 Command and control
02:52:30 Understanding how data is collected and processed
02:53:30 Data collection
02:55:35 Exploit – DB
02:59:30 Social Engineering
03:07:40 Malware analysis tools
03:08:15 Virtual Machine
03:14:15 How threat reports are created
03:15:20 Methods of validation and prioritization
03:16:08 Interpretation and analysis
03:17:25 Analyst skills
03:18:00 Intelligence Platform
03:18:20 Adjustment
03:19:25 Distribution
03:21:20 TI tools for writing reports
03:25:40 Forms of administration of Ti
03:28:40 TLP
03:30:00 Platforms for information exchange
03:33:20 CTIA

Agenda of the meeting

Definition of data, information and intelligence
Definition of cyber threat intelligence and its phases
Types of threat intelligence
Understanding cyber threats and kill chain methodology
Understanding how data is collected and processed
How threat intelligence is created and disseminated

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.