Open Secrets of the Defense Industry - Building Your Own Intelligence Program From the Ground
Offered By: YouTube
Course Description
Overview
Explore the intricacies of building an intelligence program from the ground up in this 51-minute conference talk from BSides Columbus 2016. Delve into topics such as advanced persistent threats, static variables, and class structure within the aerospace industry. Learn about intelligence gathering techniques, including open-source methods, data collection, and the importance of feedback loops. Discover the significance of intel sharing, targeting information, and defending data through best practices and protocols. Gain insights into effective intel sharing communities, automated remediation, and top security controls. Examine practical examples like fake login forms, Cuckoo Sandbox, and document tracking to enhance your understanding of offensive and defensive strategies in the cybersecurity landscape.
Syllabus
Introduction
Who am I
Overview
Means
Advanced Persistent
Static Variables
Class Structure
Aerospace Industry
Not a Rat
Fake Login Form
Intelligence
Feedback Loop
Data Collection
Goals
Why Open Source
People
Cuckoo Sandbox
Document
Tracking
Sharing
Declassified Report
Intel Sharing
Targeting Information
Reporting Watering Holes
Defending Data
Best Practices
Protocols
Crits
What makes a good Intel sharing community
No leverage
Automated remediation
Slides
Top Security Controls
Related Courses
Real-Time Cyber Threat Detection and MitigationNew York University (NYU) via Coursera Ciberseguridad: ataques y contramedidas
Universidad Rey Juan Carlos via Independent Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Cyber Security Advanced Persistent Threat Defender Preview
Udemy Threat Intelligence: Cyber Threats and Kill Chain Methodology
Pluralsight