YoVDO

Threat Intelligence with MISP

Offered By: Pluralsight

Tags

Threat Intelligence Courses Cybersecurity Courses MISP Courses

Course Description

Overview

In this course, you will learn how to implement open source threat intelligence sharing and analysis using MISP.

A major part of the threat intelligence cycle is the analysis and distribution of credible information, tactics, techniques and procedures and exploitations. MISP is one of a series of tools which effectively allows for the storing and dissemination of a wide range of cyber threat intelligence types. In this course, you’ll cover how to utilize MISP to detect and protect against indicators of compromise in an enterprise environment as part of the Threat Intelligence Program. First, you’ll get an understanding of what MISP is and how it can enhance your organizational Threat Intelligence Program. Next, you’ll understand how MISP is used throughout the intelligence sharing community and works as a mitigation technique within Mitre. Finally, you will understand how to install and configure MISP and analyze a variety of threat indicators of compromise, anomalies, and events. When you’re finished with this course, you’ll have the skills and knowledge to implement these detection techniques using MISP.

Syllabus

  • Course Overview (Tool Introduction) 1min
  • Resources 20mins

Taught by

Phil Chapman

Related Courses

CTI Operational Procedures with Jupyter Notebooks and MISP
Cooper via YouTube
Discover How EclecticIQ Platform and MISP Go Together
Cooper via YouTube
How I've Broken Every Threat Intel Platform and Settled on MISP
Cooper via YouTube
MISP Updates - Hack.lu 2023
Cooper via YouTube
Connecting CTI and SOC Teams - MISP42
Cooper via YouTube