Threat Intelligence: Cyber Threats and Kill Chain Methodology
Offered By: Pluralsight
Course Description
Overview
Understanding your enemy is essential for a threat intelligence analyst. This course will teach you about the main cyber threats and how attackers work.
As a cyber threat intelligence analyst, you must understand the main threats and how attackers do their work. By understanding the hacker mindset and the procedures that malicious attackers use, you will be able to better protect your company. In this course, Cyber Threats and Kill Chain Methodology (C|TIA Prep), you’ll learn about the main cybersecurity threat vectors/actors as well as how the attackers perform their work. First, you’ll explore the main cyber security threats, including a deep dive into the most current threat vectors and threat actors. Next, you’ll discover the main indicators of compromise, so then you can easily spot early signs of intrusion in your organization. Finally, you’ll learn about Advanced Persistent Threats (APT) groups as well as the kill chain methodology that they use. When you’re finished with this course, you’ll have the skills and knowledge of the main threat vectors and threat actors needed to better protect your company. This course covers the second chapter of the Cyber Threat Intelligence Analyst (C|TIA or CTIA) Certification.
As a cyber threat intelligence analyst, you must understand the main threats and how attackers do their work. By understanding the hacker mindset and the procedures that malicious attackers use, you will be able to better protect your company. In this course, Cyber Threats and Kill Chain Methodology (C|TIA Prep), you’ll learn about the main cybersecurity threat vectors/actors as well as how the attackers perform their work. First, you’ll explore the main cyber security threats, including a deep dive into the most current threat vectors and threat actors. Next, you’ll discover the main indicators of compromise, so then you can easily spot early signs of intrusion in your organization. Finally, you’ll learn about Advanced Persistent Threats (APT) groups as well as the kill chain methodology that they use. When you’re finished with this course, you’ll have the skills and knowledge of the main threat vectors and threat actors needed to better protect your company. This course covers the second chapter of the Cyber Threat Intelligence Analyst (C|TIA or CTIA) Certification.
Syllabus
- Course Overview 1min
- Threat Vectors and Threat Actors 42mins
- Indicators of Compromise (IoCs) 30mins
- The Kill Chain Methodology 33mins
- Advanced Persistent Threats (APTs) 39mins
Taught by
Ricardo Reimao
Related Courses
Real-Time Cyber Threat Detection and MitigationNew York University (NYU) via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Cyber Security Advanced Persistent Threat Defender Preview
Udemy Cyber Security, Tools, Techniques and Counter Measures
IGNOU via Swayam