Course curriculum

    1. Intro -Welcome and Course Goals

    2. M1L1V1-Threat Actor Types and Attribution

    3. M1L1V2-Threat Modeling Frameworks

    4. M1L1V3-Legal_ Ethical_ and Policy Considerations

    1. M1L2V1- Intelligence Collection Methodologies

    2. M1L2V2- Threat Infrastructure Analysis

    3. M1L2V3 _Malware and Campaign Correlation

    1. Reading - What Are Threat Intelligence Tools?

    2. Hands-On-Learning - Analyzing Malware and Tracking Threat Campaigns with Sandboxes and Intel Repositories

    3. Quiz - Data Analysis and Validation

    4. M1L3V1_Data Enrichment and Validation

    5. M1L3V1- Demo- Intelligence Collection and Malware and Campaign Correlation

    6. M1L3V2_Analytical Methodologies

    7. M1L3V3 - Attribution and Profiling

    1. M2L1V1-Analysis of Competing Hypotheses (ACH)

    2. M2L1V2 - Red Teaming

    3. M2L1V3 - Scenario Modelling

    1. M2L2V1-Attribution Frameworks

    2. M2L2V2-Attribution Challenges

    3. M2L2V3-Attribution Case study examples

    1. Reading - Five Key Steps to Delivering Intelligence Reports that Your Board Actually Reads

    2. Hands-On-Learning - Create a 3-Minute "Threat Update" Presentation

    3. Quiz - Intelligence Confidence and Enterprise Risk Modelling

    4. M2L3V1 Intelligence Confidence Language

    5. M2L3V2 Threat Modelling for Enterprise Risk

    6. M2L3V3 -Threat Model Design Using NIST 800-30 or STRIDE

About this course

  • Free
  • 50 lessons
  • 3.5 hours of video content

Discover your potential, starting today