Introduction to STIX - TAXII 2 Standards
Offered By: nullcon via YouTube
Course Description
Overview
Syllabus
Intro
CTI, STIX, TAXI & STIX Preferred
Historical Timeline
STIX Data Model Key Concepts
Adversary Domain object: Campaign
Adversary Domain object: Intrusion Set
Adversary Domain Object: Threat Actor
Attack Based Properties - 2 Tips
TTP Domain object: Attack Pattern
TTP Domain object: Malware
TTP Based Properties - 2 Tips
Incident Response Properties - 2 Tips
Detection Domain object: Indicator
Detection Domain object: Observed Data
STIX 2.1 Enhancements
STIX 2.1 Confidence
Lime RAT Report Example...
Analysis & Mapping Lime Remote Access Tool 5
Threat Modelling Example #2...
TAXI 2 Key Definitions
TAXII 2 Key Definitions Continued
API Root Discovery
Collection Discovery
Collection Object Retrieval
Posting Data to a Collection
STIX v1 Interoperability Challenges
STIX TAXII 2 Preferred Introduction
STIX TAXII 2 Preferred - Persona
Learn More On Specifications & Tools...
Taught by
nullcon
Related Courses
0Day Up Your Sleeve - Attacking macOS Environmentsnullcon via YouTube A Broken Commercial Metaverse-Based Virtual Office Platform
nullcon via YouTube A Call To Arms - Desi Jugaad
nullcon via YouTube A Hacker Walks Into A Co-Working Space
nullcon via YouTube A Kernel Hacker Meets Fuchsia OS
nullcon via YouTube