Introduction to STIX - TAXII 2 Standards
Offered By: nullcon via YouTube
Course Description
Overview
Syllabus
Intro
CTI, STIX, TAXI & STIX Preferred
Historical Timeline
STIX Data Model Key Concepts
Adversary Domain object: Campaign
Adversary Domain object: Intrusion Set
Adversary Domain Object: Threat Actor
Attack Based Properties - 2 Tips
TTP Domain object: Attack Pattern
TTP Domain object: Malware
TTP Based Properties - 2 Tips
Incident Response Properties - 2 Tips
Detection Domain object: Indicator
Detection Domain object: Observed Data
STIX 2.1 Enhancements
STIX 2.1 Confidence
Lime RAT Report Example...
Analysis & Mapping Lime Remote Access Tool 5
Threat Modelling Example #2...
TAXI 2 Key Definitions
TAXII 2 Key Definitions Continued
API Root Discovery
Collection Discovery
Collection Object Retrieval
Posting Data to a Collection
STIX v1 Interoperability Challenges
STIX TAXII 2 Preferred Introduction
STIX TAXII 2 Preferred - Persona
Learn More On Specifications & Tools...
Taught by
nullcon
Related Courses
Unearthing Malicious and Risky OpenSource Packages Using Packjnullcon via YouTube Pushing Security Left by Mutating Byte Code
nullcon via YouTube The Faces of MacOS Malware - Detecting Anomalies in a Poisoned Apple
nullcon via YouTube Contextomy - Let's Debug Together
nullcon via YouTube Mind The Gap - The Linux Ecosystem Kernel Patch Gap
nullcon via YouTube