Generating MITRE ATT&CK DNA for Groups of Actors
Offered By: Cooper via YouTube
Course Description
Overview
Explore the concept of generating MITRE ATT&CK DNA for groups of actors in this informative 36-minute conference talk by Sergey Polzunov from Cooper. Delve into the hypothesis, algorithm, and hitmap behind this approach, and learn about term frequency analysis. Examine use cases, including threat actor groups emulating each other, and discuss challenges faced in the process. Discover available resources, the potential for a centralized repository, and ways the community can contribute. Gain insights into the application of natural language processing in this field, with a specific focus on China-related threat actors.
Syllabus
Introduction
Hypothesis
Algorithm
Hitmap
Term Frequency
Disclaimer
China
Use cases
Threat actor groups emulating each other
What are the challenges
What resources are available
Is there a centralized repository
How can the community help
Natural language processing
Taught by
Cooper
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network