YoVDO

Cyber Threat Intelligence Demystified - Leveraging Intelligence for Effective Cybersecurity

Offered By: Okta via YouTube

Tags

Cyber Threat Intelligence Courses Cybersecurity Courses Incident Response Courses Security Operations Courses Threat Hunting Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical role of cyber threat intelligence in modern cybersecurity strategies during this 46-minute conference talk from Disclosure 2020. Gain insights from CrowdStrike's Director of Strategic Threat Advisors Group, Jason Rivera, as he demystifies threat intelligence solutions and their practical applications. Learn how to effectively leverage threat intelligence across your organization, from security operations to executive leadership. Discover best practices for tactical, operational, and strategic intelligence, and understand the relationship between defenders and adversaries. Examine relevant use cases, the importance of automation in investigations, and the capabilities of CrowdStrike's Falcon X intelligence products. Equip yourself with the knowledge to proactively respond to and pre-empt advanced cyber threats in today's evolving security landscape.

Syllabus

Intro
ADVERSARIES ARE BECOMING MORE CAPABLE WHILE... DEFENDERS ARE STRUGGLING TO STOP THEM
THREAT INTELLIGENCE IS ABOUT UNDERSTANDING THE RELATIONSHIP BETWEEN OURSELVES & THE ADVERSARY
THE OUTCOME OF VIRTUALLY ALL CONFUCTS IS DITERMINED AS A FUNCTION OF THREE CORE COMPONENTS
BEST PRACTICES: TACTICAL INTELLIGENCE
TACTICAL INTELLIGENCE HIGHLIGHT
BEST PRACTICES OPERATIONAL INTELLIGENCE
BEST PRACTICES: STRATEGIC INTELLIGENCE
THREAT INTELLIGENCE WHAT USE CASES ARE RELEVANT TO YOU?
INVESTIGATIONS WITHOUT AUTOMATION ARE BOTH TIME CONSUMING AND COMPLICATED
FALCON X ENDPOINT INTELLIGENCE AUTOMATION WORKFLOW
FALCON X IS THE FIRST AND ONLY INTEL CAPABILITY TO AUTOMATICALLY SYNTHESIZE ENDPOINT DETECTIONS WITH THREAT INTELLIGENCE
FALCON X THREAT INTELLIGENCE PRODUCT
FALCON X STANDARD
FALCON X PREMIUM
FALCON X ELITE
FALCON X DEDICATED ANALYST PROGRAM
FALCON X CAPABILITIES
LOOKING FOR MORE INFORMATION?


Taught by

Okta

Related Courses

Cyber Threat Intelligence
IBM via Coursera
Operationalizing Cyber Threat Intel: Pivoting & Hunting
Pluralsight
Ethical Hacking: Introduction to Ethical Hacking
LinkedIn Learning
The Future of Network Security and Defence
Coventry University via FutureLearn
Data Collection and Processing (CTIA Prep)
Pluralsight