Threat Intelligence with MISP
Offered By: Pluralsight
Course Description
Overview
In this course, you will learn how to implement open source threat intelligence sharing and analysis using MISP.
A major part of the threat intelligence cycle is the analysis and distribution of credible information, tactics, techniques and procedures and exploitations. MISP is one of a series of tools which effectively allows for the storing and dissemination of a wide range of cyber threat intelligence types. In this course, you’ll cover how to utilize MISP to detect and protect against indicators of compromise in an enterprise environment as part of the Threat Intelligence Program. First, you’ll get an understanding of what MISP is and how it can enhance your organizational Threat Intelligence Program. Next, you’ll understand how MISP is used throughout the intelligence sharing community and works as a mitigation technique within Mitre. Finally, you will understand how to install and configure MISP and analyze a variety of threat indicators of compromise, anomalies, and events. When you’re finished with this course, you’ll have the skills and knowledge to implement these detection techniques using MISP.
A major part of the threat intelligence cycle is the analysis and distribution of credible information, tactics, techniques and procedures and exploitations. MISP is one of a series of tools which effectively allows for the storing and dissemination of a wide range of cyber threat intelligence types. In this course, you’ll cover how to utilize MISP to detect and protect against indicators of compromise in an enterprise environment as part of the Threat Intelligence Program. First, you’ll get an understanding of what MISP is and how it can enhance your organizational Threat Intelligence Program. Next, you’ll understand how MISP is used throughout the intelligence sharing community and works as a mitigation technique within Mitre. Finally, you will understand how to install and configure MISP and analyze a variety of threat indicators of compromise, anomalies, and events. When you’re finished with this course, you’ll have the skills and knowledge to implement these detection techniques using MISP.
Syllabus
- Course Overview (Tool Introduction) 1min
- Resources 20mins
Taught by
Phil Chapman
Related Courses
CTI Operational Procedures with Jupyter Notebooks and MISPCooper via YouTube Discover How EclecticIQ Platform and MISP Go Together
Cooper via YouTube How I've Broken Every Threat Intel Platform and Settled on MISP
Cooper via YouTube MISP Updates - Hack.lu 2023
Cooper via YouTube Connecting CTI and SOC Teams - MISP42
Cooper via YouTube