YoVDO

How I've Broken Every Threat Intel Platform and Settled on MISP

Offered By: Cooper via YouTube

Tags

Threat Intelligence Courses Cybersecurity Courses Malware Analysis Courses Incident Response Courses Enterprise Security Courses MISP Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk that delves into the challenges of categorizing, storing, and operationalizing various sources of intelligence in enterprise environments. Learn about the design flaws in many intel platforms and the importance of correlating diverse data points like IP addresses, hostnames, file names, and TLS certificates into common events for effective threat intelligence. Discover the speaker's journey in finding a suitable platform to store a large malware configuration database, ultimately settling on MISP. Gain insights into shifting the paradigm from indicators to events as the starting point for threat intelligence work, emphasizing the significance of retaining, analyzing, and correlating the relationships between all observables in an attack. The talk is presented by John Bambenek, an experienced cybersecurity professional with extensive background in threat research, incident handling, and intelligence dataset production.

Syllabus

Hack.lu 2017 How I’ve Broken Every Threat Intel Platform I’ve Ever Had (And Settled on MISP)


Taught by

Cooper

Related Courses

Proactive Computer Security
University of Colorado System via Coursera
Security in Office 365
Microsoft via edX
Threat Detection: Planning for a Secure Enterprise
Microsoft via edX
Cyber Threat Intelligence
IBM via Coursera
Security Analyst Fundamentals
IBM via Coursera