YoVDO

Intelligence Creating Intelligence - Leveraging What You Know to Improve Finding What You Don't

Offered By: YouTube

Tags

GrrCon Courses Data Analysis Courses Cybersecurity Courses Threat Intelligence Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore intelligence creation techniques in this 22-minute conference talk from GrrCon 2018. Learn how to leverage existing knowledge to improve threat intelligence gathering and utilization within enterprise environments. Discover effective methods for sourcing threat intel, avoiding common pitfalls in enterprise implementation, and enhancing intel usefulness. Gain insights on initiating the process, comparing noisy intel against historical network data, establishing parameters for low-noise indicators, and compiling actionable threat feeds. Examine additional strategies for data refinement, potential drawbacks of the approach, and real-world implementation results.

Syllabus

Intelligence Creating Intelligence: Leveraging
Where can I get Threat Intel?
Bad Ways of using Threat Intelligence in the Enterprise
What can I do to make intel more useful?
Considerations before starting
Where do I start?
Comparing the "Noisy Intel" against historical network for other data
Establishing parameters to identify low- noise indicators
Compiling the data into a usable threat feed
What are other things I can do to drill down the data?
Drawbacks of this Approach
Implementation Results


Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network